cloud-sql-postgres-view-config

Warn

Audited by Socket on Apr 28, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/get_instance.js

No direct malicious behavior is evident in this wrapper code itself. However, it meaningfully increases security exposure by (a) optionally reading a local .env file and propagating its key/value pairs into the environment of an externally executed npx command, (b) forwarding arbitrary user-supplied CLI arguments to that invoked tool, and (c) using shell: true on Windows when spawning npx.cmd. The dominant supply-chain/operational risk is that the executed @toolbox-sdk/server tool will run with potentially sensitive environment values and with unvalidated arguments, so the invoked dependency and its logging/argument handling should be treated as part of the threat model.

Confidence: 66%Severity: 62%
Audit Metadata
Analyzed At
Apr 28, 2026, 10:25 PM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Fcloud-sql-postgresql%2Fcloud-sql-postgres-view-config%2F@bf72863294872cd907987f6cfe46ba0ef2035d00