pelican-panel-plugins
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [SAFE]: Analysis of the skill reveals it is a legitimate developer resource for building plugins for the Pelican panel. No malicious intent, obfuscation, or security bypasses were found. All documented patterns align with the expected functionality of an extensible management panel.
- [COMMAND_EXECUTION]: The skill references the
php artisan p:plugin:makecommand, which is the standard tool for scaffolding plugins within the Pelican/Laravel ecosystem. This is a routine developer operation. - [CREDENTIALS_UNSAFE]: Provides best-practice examples for handling sensitive data like API keys using environment variables and configuration files. It specifically demonstrates the use of
EnvironmentWriterTraitto persist settings to the.envfile, which is a standard method for secret management in this framework. - [EXTERNAL_DOWNLOADS]: Documents the standard
composer_packagesfield inplugin.jsonfor declaring plugin dependencies through the PHP composer ecosystem. The examples provided are generic and do not point to suspicious repositories. - [DATA_EXFILTRATION]: Includes code patterns for interacting with official APIs, such as Cloudflare's public API, using Laravel's HTTP client. These are presented in the context of standard third-party service integrations required for gaming panel functionality.
Audit Metadata