nocobase-ui-builder

Warn

Audited by Socket on Apr 27, 2026

1 alert found:

Anomaly
AnomalyLOW
runtime/src/index.js

No overt malicious payload indicators (e.g., hardcoded credentials, obvious exfiltration, backdoor logic, or explicit obfuscation) are present in this fragment. However, the module is designed to accept attacker-controlled JavaScript (inline or file-loaded) and to execute it via runTask, while also loading attacker-controlled context/network JSON from filesystem paths derived from batch inputs. The primary security risk is the overall execution/sandbox and policy enforcement quality inside runTask and the path confinement implemented by loadMaybeFile/assertCode (not shown). As written, it represents a non-trivial risk surface typical of “execute user code” systems; confirm sandboxing, network/file permissions, strict path traversal protections, and robust size/time limits for inspection and JSON parsing.

Confidence: 45%Severity: 65%
Audit Metadata
Analyzed At
Apr 27, 2026, 12:31 PM
Package URL
pkg:socket/skills-sh/nocobase%2Fskills%2Fnocobase-ui-builder%2F@bc191011242ab6d6f38c5a56cad6b8f9c7d682c9