nocobase-ui-builder

Warn

Audited by Socket on May 6, 2026

1 alert found:

Anomaly
AnomalyLOW
runtime/src/index.js

No overt malicious payload indicators (e.g., hardcoded credentials, obvious exfiltration, backdoor logic, or explicit obfuscation) are present in this fragment. However, the module is designed to accept attacker-controlled JavaScript (inline or file-loaded) and to execute it via runTask, while also loading attacker-controlled context/network JSON from filesystem paths derived from batch inputs. The primary security risk is the overall execution/sandbox and policy enforcement quality inside runTask and the path confinement implemented by loadMaybeFile/assertCode (not shown). As written, it represents a non-trivial risk surface typical of “execute user code” systems; confirm sandboxing, network/file permissions, strict path traversal protections, and robust size/time limits for inspection and JSON parsing.

Confidence: 45%Severity: 65%
Audit Metadata
Analyzed At
May 6, 2026, 07:35 PM
Package URL
pkg:socket/skills-sh/nocobase%2Fskills%2Fnocobase-ui-builder%2F@1080ff4b372b90d967d0d509f716ace4c7e6768e