preview-threejs

Warn

Audited by Socket on Apr 17, 2026

1 alert found:

Security
SecurityMEDIUM
templates/scripts/threejs-renderer.js

No direct evidence of built-in malware (e.g., credential theft, exfiltration, crypto-mining) exists in this snippet alone. However, the module contains a high-impact, supply-chain-like risk: it dynamically loads and executes additional JavaScript from a DOM-derived `userCodeSrc` without visible validation or sandboxing. It also uses `innerHTML` for UI construction and inserts `error.message` via `innerHTML`, which can enable DOM XSS depending on helper implementations and error content. This file should only be used with strict control over `threejs-user-code-src` (allowlist + integrity) and should render dynamic text with text-safe APIs instead of `innerHTML` for error messages.

Confidence: 70%Severity: 80%
Audit Metadata
Analyzed At
Apr 17, 2026, 09:39 AM
Package URL
pkg:socket/skills-sh/veelenga%2Fpreview-skills%2Fpreview-threejs%2F@13d0b80f7360006ef29c63ffc762bc68639d8c53