enonic-controller-generator
Warn
Audited by Socket on May 4, 2026
1 alert found:
AnomalyAnomalyreferences/examples.md
LOWAnomalyLOW
references/examples.md
The module is mostly standard Enonic XP CMS-driven rendering, but it contains a significant security concern: a response processor unconditionally injects an external third-party JavaScript file into every rendered page. While this may be intended for analytics, it creates a high-impact client-side dependency without visible integrity/allowlist/CSP controls in this snippet. No clear malware/backdoor logic is evident beyond this remote script inclusion.
Confidence: 72%Severity: 65%
Audit Metadata