qe-n8n-expression-testing
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The SKILL.md file contains implementation logic for the validateExpressionSyntax and testExpression functions that use the new Function constructor to dynamically execute JavaScript code from strings. This presents a risk of arbitrary code execution if expressions are sourced from untrusted data.
- [PROMPT_INJECTION]: The skill exposes an attack surface for indirect prompt injection by processing and executing arbitrary expression strings.
- Ingestion points: The expression parameter in the testExpression and validateExpressionSyntax functions.
- Boundary markers: No delimiters or instructions to ignore malicious embedded content are defined.
- Capability inventory: Dynamic execution of JavaScript via new Function().
- Sanitization: The implementation only removes template markers and lacks code sanitization or sandboxing.
Audit Metadata