cloud-sql-sqlserver-admin
Audited by Socket on Apr 29, 2026
3 alerts found:
Anomalyx3No direct evidence of intentional malware within this wrapper code (no obfuscation and no explicit data theft/exfiltration). However, it meaningfully increases supply-chain/execution risk by invoking an external package at runtime via npx and it can propagate secrets/configuration by loading '../../../.env' (when GEMINI_CLI=1) and forwarding all derived environment variables into the spawned tool. The Windows use of shell:true slightly increases the risk surface. Overall: likely benign orchestration with moderate security risk driven by delegation and secret propagation.
No clear evidence of intentional malware/backdoor behavior within this wrapper code itself. However, it increases supply-chain/execution risk by dynamically running an external npm package via npx and forwarding both user-controlled arguments and potentially sensitive environment variables (optionally loaded from a local .env file) into the executed child process. Review the behavior and argument/environment handling of the invoked @toolbox-sdk/server tool, and ensure .env contents and CLI args are controlled in trusted contexts.
No clear malicious payload is evident in this module (no obfuscation, no eval-like execution, no direct network/file-destruction logic). The security concern is orchestration behavior: it dynamically executes a third-party dependency via npx and forwards both user-supplied arguments and potentially sensitive environment variables (including optionally injected secrets from a local .env file) into that child process. This should be reviewed and treated as a supply-chain/execution-trust and secret-handling risk rather than confirmed malware.