Skip to main content

electron-vue-ipc

Structures a secure Electron + Vue 3 app with typed IPC and modular handlers for effective communication and process isolation.

Install this skill

or
64/100

Security score

The electron-vue-ipc skill was audited on Mar 8, 2026 and we found 10 security issues across 3 threat categories, including 1 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

medium line 369

Template literal with variable interpolation in command context

SourceSKILL.md
369mergeIntoStore(prefix ? `${prefix}.${key}` : key, val);
medium line 406

Template literal with variable interpolation in command context

SourceSKILL.md
406if (!project) throw new Error(`Project ${projectId} not found`);
low line 67

Node child_process module reference

SourceSKILL.md
67│ - Full Node.js access (fs, net, child_process, etc.) │
medium line 76

Node child_process module reference

SourceSKILL.md
76`child_process`. The preload script is the controlled gateway.
high line 872

Access to system keychain/keyring

SourceSKILL.md
872wraps Electron's `safeStorage` or OS keychain. Never expose raw `safeStorage` to
low line 978

External URL reference

SourceSKILL.md
978- **Electron:** https://www.electronjs.org/docs
low line 979

External URL reference

SourceSKILL.md
979- **Electron IPC:** https://www.electronjs.org/docs/latest/tutorial/ipc
low line 980

External URL reference

SourceSKILL.md
980- **Vue 3:** https://vuejs.org
low line 981

External URL reference

SourceSKILL.md
981- **Pinia:** https://pinia.vuejs.org
low line 982

External URL reference

SourceSKILL.md
982- **electron-vite:** https://electron-vite.org
Scanned on Mar 8, 2026
View Security Dashboard