vtable-development-assistant
Audited by Socket on Mar 9, 2026
1 alert found:
SecurityThe analyzed code enables execution of user-supplied JavaScript via new Function after minimal sanitization and monkey-patches to intercept certain library constructors. This creates significant supply-chain and runtime-risk: untrusted code can perform arbitrary actions in the page context, potentially exfiltrate data, manipulate UI, or abuse the VTable API. The presence of a secondary config-parsing path compounds risk by allowing more code paths to influence behavior. This setup is not sandboxed and should be avoided or strictly sandboxed (e.g., via an iframe with a strict CSP, content security policies, or a dedicated JS sandbox) before being used with untrusted code. Additionally, implement strong input validation, restrict DOM access, and adopt a formal sandbox or CSP to mitigate exposure from dynamic evaluation.