threejs-syntax-loaders
Warn
Audited by Snyk on Apr 1, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The SKILL.md examples and workflow show Three.js loaders (GLTFLoader, TextureLoader, RGBELoader, etc.) fetching and parsing assets from arbitrary URLs (e.g., 'https://other-domain.com/texture.jpg', 'model.glb', 'https://www.gstatic.com/...') and then reading gltf.scene, animations, cameras and userData as part of runtime logic, which clearly ingests untrusted third‑party content that can influence application behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill calls dracoLoader.setDecoderPath('https://www.gstatic.com/draco/versioned/decoders/1.5.6/'), which at runtime causes the loader to fetch and execute remote WASM/JS decoder files (remote code) and is presented as a required dependency for Draco-compressed models.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata