db-query-executor

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
scripts/db_cleanup.py

This file is unsafe in its current form and should not be run as-is. It contains insecure credential handling (passwords on command line and in child env), executes powerful docker exec commands, and includes a suspicious fragment that attempts to read environment variables from containers (potential secret harvesting). The code is syntactically broken and appears truncated or tampered with; treat the package as untrusted until the source is restored from a verified commit, secrets handling is improved (avoid command-line passwords, prefer secure credential stores or socket-based auth), inputs are validated/escaped, and the stray docker printenv logic is removed or reviewed. No clear active malware (C2/exfil host or reverse shell) was found in the fragment, but the capabilities present could be abused for credential theft if repaired and executed.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 16, 2026, 01:51 AM
Package URL
pkg:socket/skills-sh/aleister1102%2Fskills%2Fdb-query-executor%2F@8737c3b55a2505ba697a21b9aa3aa237a6613a02