skills/syncfusion/javascript-ui-controls-skills/syncfusion-javascript-querybuilder/Gen Agent Trust Hub
syncfusion-javascript-querybuilder
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFE
Full Analysis
- [DATA_EXPOSURE]: The skill provides examples for manually generating SQL strings from query rules. This pattern introduces a vulnerability surface for SQL injection if the resulting queries are executed on a database without proper parameterization. Evidence found in
references/import-export.mdandreferences/filtering-search.md.- [DYNAMIC_EXECUTION]: Implementation examples for custom templates inreferences/templates-customization.mdutilizeinnerHTMLto inject content derived from the data source into the DOM. This represents a potential Cross-Site Scripting (XSS) risk if the bound data contains unsanitized scripts.- [PROMPT_INJECTION]: The skill is designed to ingest and process external filter rules in JSON format, which constitutes an indirect prompt injection surface. - Ingestion points: Filter rules loaded from local storage, user-uploaded files, or remote endpoints as shown in
references/import-export.mdandreferences/data-binding.md. - Boundary markers: No explicit delimiters or instructions are used in the documentation to separate data from execution context.
- Capability inventory: UI rendering, data filtering, and network requests via
DataManagerorfetchas documented across several files. - Sanitization: The documentation provides example validation logic in
references/import-export.md(thevalidateRulesfunction) to verify the structure and field mapping of imported rules before they are applied.
Audit Metadata