mysql
Fail
Audited by Socket on Feb 19, 2026
1 alert found:
Obfuscated FileObfuscated Fileconnections.example.json
HIGHObfuscated FileHIGH
connections.example.json
This JSON configuration file itself is not malicious code, but it contains plaintext database credentials and potentially weakened TLS configuration (ssl_disabled true for staging), which constitute a significant supply-chain/security risk if the file is stored in source control or included in artifacts. Treat any discovery of these values in a public or shared repo as a high-priority secret exposure: rotate credentials, remove secrets from the repo, and adopt a secrets-management workflow.
Confidence: 98%
Audit Metadata