cloud-sql-postgres-lifecycle

Warn

Audited by Socket on Apr 28, 2026

5 alerts found:

Anomalyx5
AnomalyLOW
scripts/restore_backup.js

No explicit malicious payload is visible in this wrapper, but it is a sensitive launcher that executes a third-party tool via npx (runtime code execution) and forwards arbitrary CLI arguments and environment variables (including values loaded from a local .env file in one mode) into the restore_backup operation. This creates meaningful supply-chain/runtime risk and increases the impact of any downstream argument-handling flaws or compromised dependency behavior.

Confidence: 66%Severity: 58%
AnomalyLOW
scripts/get_instance.js

No direct malicious behavior is evident in this wrapper code itself. However, it meaningfully increases security exposure by (a) optionally reading a local .env file and propagating its key/value pairs into the environment of an externally executed npx command, (b) forwarding arbitrary user-supplied CLI arguments to that invoked tool, and (c) using shell: true on Windows when spawning npx.cmd. The dominant supply-chain/operational risk is that the executed @toolbox-sdk/server tool will run with potentially sensitive environment values and with unvalidated arguments, so the invoked dependency and its logging/argument handling should be treated as part of the threat model.

Confidence: 66%Severity: 62%
AnomalyLOW
scripts/wait_for_operation.js

This module is not overtly malicious in itself, but it creates a moderate security/supply-chain risk by executing a third-party package via `npx` and passing through potentially sensitive environment variables (including values imported from a local `.env` when enabled) plus unvalidated user-supplied CLI arguments. The main concern is unintended secret exposure or harmful behavior originating from the executed dependency/tool rather than from this wrapper’s own code.

Confidence: 60%Severity: 55%
AnomalyLOW
scripts/list_instances.js

No direct evidence of intentional malware (backdoor, keylogging, exfiltration, or destructive activity) is present in this wrapper. The primary security concern is that it executes external npm package code at runtime via npx and passes through an environment that may include secrets imported from a local .env file and broadly remapped configuration variables. This is best treated as a supply-chain/execution-context risk requiring dependency integrity controls (lockfiles, provenance, pinning/verification) and secret-minimization (avoid loading .env into the child env unless necessary).

Confidence: 63%Severity: 62%
AnomalyLOW
scripts/create_backup.js

No direct malicious behavior is evident in this wrapper (no obfuscation, no credential theft/exfiltration code, no persistence). However, the code significantly increases security exposure by loading a local .env file and forwarding both ambient environment variables and user-supplied CLI arguments into a spawned third-party tool executed via npx to perform a hardcoded sensitive operational action ("create_backup"). This is primarily a secret-forwarding and supply-chain/runtime execution risk that should be reviewed/controlled (e.g., avoid loading .env for untrusted invocations, restrict/allowlist forwarded env/args, and review the behavior of the invoked toolbox/tool).

Confidence: 63%Severity: 66%
Audit Metadata
Analyzed At
Apr 28, 2026, 10:26 PM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Fcloud-sql-postgresql%2Fcloud-sql-postgres-lifecycle%2F@05ac4782f8ff1b96c7373a7d2b3be248985e5fae