supabase-splinter-review

Warn

Audited by Socket on Feb 23, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/run_splinter.sh

This script is not inherently malware, but it contains high-risk operations for supply-chain attack and credential exposure: it downloads SQL from a (configurable) remote URL and executes it directly against a database, and it writes the DB connection URL (possibly including plaintext credentials) to disk. An attacker able to modify the SPLINTER_URL or the hosted SQL can cause arbitrary SQL execution (data exfiltration, modification, or destructive actions). Recommend treating the downloaded SQL as untrusted: pin to a specific commit or checksum, verify signatures, restrict execution privileges, avoid persisting credentials in metadata, and limit who can set SPLINTER_URL or run this script.

Confidence: 90%Severity: 70%
Audit Metadata
Analyzed At
Feb 23, 2026, 06:06 AM
Package URL
pkg:socket/skills-sh/dolessHQ%2Fself-obsolescence%2Fsupabase-splinter-review%2F@01ebd7f24038e79c1cb52e96aad0050a2c0e966b