Evaluate JavaScript at bundle time and inline results. Use when optimizing compile-time code generation, embedding files, inlining environment variables, or executing code during the bundling process.
Security
2 findings — 1 high severity, 1 medium severity. You should review these findings carefully before considering using this skill.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 1.00). The skill explicitly describes macros that read process.env keys and inline their values into bundled output (e.g., env("API_URL") -> const apiUrl = "https://..."; and requireEnv("API_SECRET")), which requires emitting secret/environment values verbatim into generated code, creating an exfiltration risk.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The SKILL.md "Async Macros" example defines fetchSchema which uses fetch("https://api.example.com/schema.json") and inlines the fetched schema at build time, meaning external/untrusted HTTP responses can be read and materially influence generated code and subsequent build actions.
90d6bd7
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.