Arbitrary code execution vulnerability via eval(fs.readFileSync(f)) in wasi-worker.mjs if the file path f is attacker controlled.
No verification record available.
The file wasi-worker.mjs uses fs.readFileSync to read a file specified by the f argument and then executes it using eval. This allows arbitrary code execution if the f argument is attacker-controlled, potentially leading to malicious behavior. This is a high-risk pattern.