postgres
Audited by Socket on May 9, 2026
1 alert found:
AnomalySUSPICIOUS. The skill’s capabilities are broadly aligned with its stated Postgres purpose and its data flows target the user’s database rather than a third-party gateway. However, the core runtime depends on a bundled scripts/postgres artifact whose provenance, release trail, and integrity are not verifiable from the provided material, creating a meaningful trust gap. Credentials may be supplied via environment variables and forwarded into that local executable, increasing risk even without clear malicious behavior. No evidence of credential exfiltration, hidden network routing, or unrelated access was shown, so this is not malware, but it is a medium-risk skill due to the unverifiable bundled execution surface.