db-query-executor
Audited by Socket on Feb 16, 2026
1 alert found:
Obfuscated FileThis file is unsafe in its current form and should not be run as-is. It contains insecure credential handling (passwords on command line and in child env), executes powerful docker exec commands, and includes a suspicious fragment that attempts to read environment variables from containers (potential secret harvesting). The code is syntactically broken and appears truncated or tampered with; treat the package as untrusted until the source is restored from a verified commit, secrets handling is improved (avoid command-line passwords, prefer secure credential stores or socket-based auth), inputs are validated/escaped, and the stray docker printenv logic is removed or reviewed. No clear active malware (C2/exfil host or reverse shell) was found in the fragment, but the capabilities present could be abused for credential theft if repaired and executed.