qe-n8n-expression-testing

Warn

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The SKILL.md file contains implementation logic for the validateExpressionSyntax and testExpression functions that use the new Function constructor to dynamically execute JavaScript code from strings. This presents a risk of arbitrary code execution if expressions are sourced from untrusted data.
  • [PROMPT_INJECTION]: The skill exposes an attack surface for indirect prompt injection by processing and executing arbitrary expression strings.
  • Ingestion points: The expression parameter in the testExpression and validateExpressionSyntax functions.
  • Boundary markers: No delimiters or instructions to ignore malicious embedded content are defined.
  • Capability inventory: Dynamic execution of JavaScript via new Function().
  • Sanitization: The implementation only removes template markers and lacks code sanitization or sandboxing.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 27, 2026, 06:09 PM