firestore-data

Warn

Audited by Socket on Apr 29, 2026

3 alerts found:

Anomalyx3
AnomalyLOW
scripts/list_collections.js

No direct malware indicators are present in this wrapper code, but it meaningfully increases risk by executing a third-party package at runtime through npx and by conditionally reading a local .env file and propagating those values into the environment of the spawned dependency. If the invoked package/tool is compromised or mishandles environment variables, secrets could be exposed; additionally, Windows shell execution and direct forwarding of user arguments increase the chance of unintended behavior in downstream tooling. This should be reviewed in the context of the trust level of @toolbox-sdk/server and how .env contents are managed.

Confidence: 64%Severity: 56%
AnomalyLOW
scripts/delete_documents.js

This module is a thin execution wrapper that prepares environment context (including optionally merging values from a local .env file) and then uses npx to run a third-party package to invoke a hardcoded tool named "delete_documents", forwarding user-provided arguments without validation. The wrapper itself does not show direct malicious behavior (no eval/crypto/network/file tampering), but it meaningfully increases risk by (1) delegating execution to external code at runtime via npx and (2) propagating potentially sensitive environment values to that external tool. Given the destructive tool name, this warrants careful review of the invoked dependency/tool’s behavior and runtime permissions.

Confidence: 62%Severity: 65%
AnomalyLOW
scripts/get_documents.js

No direct malware is evident in this wrapper code itself (no eval/Function, no overt exfiltration, no filesystem/network writes). The primary risk is security impact from delegation: it executes a third-party SDK tool via npx and forwards unvalidated user CLI arguments and a broad environment (optionally augmented with local .env secrets/config). This is a non-trivial supply-chain/runtime and data-exposure risk that should be reviewed in the context of what the invoked 'get_documents' tool does and what secrets may be present in the environment.

Confidence: 62%Severity: 64%
Audit Metadata
Analyzed At
Apr 29, 2026, 05:20 AM
Package URL
pkg:socket/skills-sh/gemini-cli-extensions%2Ffirestore-native%2Ffirestore-data%2F@bf14e08ff3cdeaaafd36e3f5fd9e6ef33b9227aa