nocobase-ui-builder
Audited by Socket on Apr 27, 2026
1 alert found:
AnomalyNo overt malicious payload indicators (e.g., hardcoded credentials, obvious exfiltration, backdoor logic, or explicit obfuscation) are present in this fragment. However, the module is designed to accept attacker-controlled JavaScript (inline or file-loaded) and to execute it via runTask, while also loading attacker-controlled context/network JSON from filesystem paths derived from batch inputs. The primary security risk is the overall execution/sandbox and policy enforcement quality inside runTask and the path confinement implemented by loadMaybeFile/assertCode (not shown). As written, it represents a non-trivial risk surface typical of “execute user code” systems; confirm sandboxing, network/file permissions, strict path traversal protections, and robust size/time limits for inspection and JSON parsing.