cloud-sql-sqlserver-data

Warn

Audited by Socket on Apr 29, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/list_tables.js

This wrapper itself shows no clear indicators of overt malware (no eval/Function usage, no persistence, no direct exfiltration, no destructive actions). However, it conditionally reads a local `.env` file and forwards the resulting environment (which may contain secrets) to an external dependency executed via `npx`, and it forwards arbitrary user CLI arguments to that dependency. This creates meaningful supply-chain and secret-handling risk that should be reviewed/controlled (e.g., restrict/allowlist forwarded env/args and ensure the `@toolbox-sdk/server` execution is integrity-checked and audited).

Confidence: 62%Severity: 58%
AnomalyLOW
scripts/execute_sql.js

No clear evidence of obfuscated or overtly malicious code in this wrapper itself. The primary concerns are security-relevant delegation: it uses `npx` to run `@toolbox-sdk/server@1.1.0` to execute a tool named `execute_sql` (strong capability signal, likely database access) and forwards user-supplied CLI arguments with minimal validation. Additionally, when enabled, it merges a local `../../../.env` into the subprocess environment, potentially exposing secrets/credentials to the invoked tool. Treat this as a meaningful security/supply-chain review item, especially in scenarios where arguments or environment values are not fully trusted.

Confidence: 66%Severity: 68%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:19 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Fcloud-sql-sqlserver%2Fcloud-sql-sqlserver-data%2F@74b9537366c2cc4104adc8afe7aff6aa8de1e077