@bytebase/dbhub

Minimal, token-efficient Database MCP Server for PostgreSQL, MySQL, SQL Server, SQLite, MariaDB

GitHub ActionsdatabaseTypeScriptMIT
0Tools
1Findings
2.4kStars
Mar 31, 2026Last Scanned

Security Findings1

1 finding detected across 1 severity level. Each finding includes a structured evidence chain answering: WHAT, WHERE, WHY, HOW CONFIDENT, and HOW TO VERIFY.

criticalD5Known Malicious PackagesMCP08-dependency-vulnAML.T0054
SOURCE: external-content at package dependency: mariadb — This package is confirmed malicious or a known typosquat targeting legitimate packages. Observed: "Known malicious package "mariadb" found in dependency list" SINK: command-execution at mariadb install/postinstall hooks — "Malicious package "mariadb" executes arbitrary code during installation or at runtime" MITIGATION ABSENT: input-validation — No protection against malicious package — it is directly listed as a dependency IMPACT: remote-code-execution (server-host, exploitability: trivial) — Malicious package "mariadb" executes attacker-controlled code in the build environment during npm install / pip install, potentially exfiltrating credentials or installing backdoors REFERENCE: MALICIOUS-PKG-DB — Known malicious package: mariadb. "mariadb" is a confirmed malicious package or typosquat — must be removed immediately VERIFY: 1. [check-dependency] Cross-reference "mariadb" against malicious package databases (npm advisories, Snyk, Socket.dev) Target: mariadb Expected: "mariadb" appears in malicious package lists or is a known typosquat CONFIDENCE: 80% [input-validation absent (+0.10); confirmed_malicious (+0.25)]
Evidence Report80% confidence
1

What Was Found

Untrusted data entry point identified. A external content source at package dependency: mariadb introduces data into the processing pipeline without adequate boundary controls. The observed input pattern is Known malicious package "mariadb" found in dependency list.

This package is confirmed malicious or a known typosquat targeting legitimate packages

Dangerous operation reached. This data reaches a operating system command execution at mariadb install/postinstall hooks, where the observed operation is Malicious package "mariadb" executes arbitrary code during installation or at runtime.

Potential impact: Remote Code Execution (RCE). If exploited, an attacker could compromise server host system. Exploitability is assessed as trivial — no special conditions required.

2

Where in the Code

The data flow traverses 2 locations from entry point to dangerous operation. The data flows directly from source to sink with no intermediate transformations or sanitization points.

ENTRY
package dependency: mariadb
Known malicious package "mariadb" found in dependency list
DANGER
mariadb install/postinstall hooks
Malicious package "mariadb" executes arbitrary code during installation or at ru…
3

Why This Is Dangerous

Remote Code Execution (RCE). Malicious package "mariadb" executes attacker-controlled code in the build environment during npm install / pip install, potentially exfiltrating credentials or installing backdoors

Scope: Server Host SystemExploitability: Trivial — No special conditions required

Missing security controls (1): The following mitigation measures were checked during analysis and found to be absent. Each represents a defense layer that, if implemented, would reduce or eliminate the exploitability of this finding.

\u2717
input validation

No protection against malicious package — it is directly listed as a dependency

Threat Intelligence Reference
MALICIOUS-PKG-DBKnown malicious package: mariadb

"mariadb" is a confirmed malicious package or typosquat — must be removed immediately

4

Confidence Assessment

80%High

This finding has been assigned a confidence score of 80% (high). Confidence reflects the strength of the evidence chain: higher values indicate that the finding was confirmed through multiple independent analysis techniques (e.g., AST-based taint tracking, structural pattern matching, or cross-reference with known CVEs). Lower values indicate the finding is based on heuristic patterns that may require manual verification.

Confidence factors: The following analysis signals contributed to the final confidence score. Positive adjustments indicate corroborating evidence; negative adjustments indicate uncertainty or partial mitigation.

+0.10
input-validation absent

No input-validation found — No protection against malicious package — it is directly listed as a dependency

+0.25
confirmed malicious

"mariadb" is listed in known malicious package databases

5

How to Verify

The following verification steps enable independent confirmation of this finding. Each step can be performed by a security reviewer, compliance auditor, or automated tooling to validate that the identified vulnerability exists and assess whether remediation has been applied.

Step 1Dependency Check
Target:mariadb

Cross-reference "mariadb" against malicious package databases (npm advisories, Snyk, Socket.dev)

Expected observation:

"mariadb" appears in malicious package lists or is a known typosquat

Remediation: Remove "mariadb" immediately. This package is confirmed malicious or a known typosquat.

Security Category Deep Dive

Select a category to explore sub-categories, findings, and compliance coverage.