vtable-development-assistant

Warn

Audited by Socket on Mar 9, 2026

1 alert found:

Security
SecurityMEDIUM
template/demo.html

The analyzed code enables execution of user-supplied JavaScript via new Function after minimal sanitization and monkey-patches to intercept certain library constructors. This creates significant supply-chain and runtime-risk: untrusted code can perform arbitrary actions in the page context, potentially exfiltrate data, manipulate UI, or abuse the VTable API. The presence of a secondary config-parsing path compounds risk by allowing more code paths to influence behavior. This setup is not sandboxed and should be avoided or strictly sandboxed (e.g., via an iframe with a strict CSP, content security policies, or a dedicated JS sandbox) before being used with untrusted code. Additionally, implement strong input validation, restrict DOM access, and adopt a formal sandbox or CSP to mitigate exposure from dynamic evaluation.

Confidence: 61%Severity: 75%
Audit Metadata
Analyzed At
Mar 9, 2026, 04:28 PM
Package URL
pkg:socket/skills-sh/visactor%2Fvtable%2Fvtable-development-assistant%2F@f6cb1d5f3dc40a0dec906994a0859a0228856aa1