cloud-sql-postgres-view-config
Warn
Audited by Socket on Apr 28, 2026
1 alert found:
AnomalyAnomalyscripts/get_instance.js
LOWAnomalyLOW
scripts/get_instance.js
No direct malicious behavior is evident in this wrapper code itself. However, it meaningfully increases security exposure by (a) optionally reading a local .env file and propagating its key/value pairs into the environment of an externally executed npx command, (b) forwarding arbitrary user-supplied CLI arguments to that invoked tool, and (c) using shell: true on Windows when spawning npx.cmd. The dominant supply-chain/operational risk is that the executed @toolbox-sdk/server tool will run with potentially sensitive environment values and with unvalidated arguments, so the invoked dependency and its logging/argument handling should be treated as part of the threat model.
Confidence: 66%Severity: 62%
Audit Metadata