cloud-sql-sqlserver-data
Audited by Socket on Apr 29, 2026
2 alerts found:
Anomalyx2This wrapper itself shows no clear indicators of overt malware (no eval/Function usage, no persistence, no direct exfiltration, no destructive actions). However, it conditionally reads a local `.env` file and forwards the resulting environment (which may contain secrets) to an external dependency executed via `npx`, and it forwards arbitrary user CLI arguments to that dependency. This creates meaningful supply-chain and secret-handling risk that should be reviewed/controlled (e.g., restrict/allowlist forwarded env/args and ensure the `@toolbox-sdk/server` execution is integrity-checked and audited).
No clear evidence of obfuscated or overtly malicious code in this wrapper itself. The primary concerns are security-relevant delegation: it uses `npx` to run `@toolbox-sdk/server@1.1.0` to execute a tool named `execute_sql` (strong capability signal, likely database access) and forwards user-supplied CLI arguments with minimal validation. Additionally, when enabled, it merges a local `../../../.env` into the subprocess environment, potentially exposing secrets/credentials to the invoked tool. Treat this as a meaningful security/supply-chain review item, especially in scenarios where arguments or environment values are not fully trusted.