pelican-panel-plugins

Pass

Audited by Gen Agent Trust Hub on Apr 16, 2026

Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
  • [SAFE]: Analysis of the skill reveals it is a legitimate developer resource for building plugins for the Pelican panel. No malicious intent, obfuscation, or security bypasses were found. All documented patterns align with the expected functionality of an extensible management panel.
  • [COMMAND_EXECUTION]: The skill references the php artisan p:plugin:make command, which is the standard tool for scaffolding plugins within the Pelican/Laravel ecosystem. This is a routine developer operation.
  • [CREDENTIALS_UNSAFE]: Provides best-practice examples for handling sensitive data like API keys using environment variables and configuration files. It specifically demonstrates the use of EnvironmentWriterTrait to persist settings to the .env file, which is a standard method for secret management in this framework.
  • [EXTERNAL_DOWNLOADS]: Documents the standard composer_packages field in plugin.json for declaring plugin dependencies through the PHP composer ecosystem. The examples provided are generic and do not point to suspicious repositories.
  • [DATA_EXFILTRATION]: Includes code patterns for interacting with official APIs, such as Cloudflare's public API, using Laravel's HTTP client. These are presented in the context of standard third-party service integrations required for gaming panel functionality.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 16, 2026, 01:32 AM