plannotator
Fail
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
scripts/install.shscript downloads a remote shell script fromhttps://plannotator.ai/install.shand pipes it directly into thebashinterpreter, which allows for the execution of arbitrary remote code on the user's system. - [PERSISTENCE_MECHANISMS]: The skill includes several scripts that automate the modification of user configuration files and shell profiles to maintain integration across sessions:
scripts/configure-remote.shappends environment variable exports (PLANNOTATOR_REMOTE,PLANNOTATOR_PORT) to shell profiles such as~/.zshrc,~/.bashrc, and~/.profile.scripts/setup-hook.sh,scripts/setup-gemini-hook.sh, andscripts/setup-codex-hook.shmodify internal agent settings files (~/.claude/settings.json,~/.gemini/settings.json, and~/.codex/config.toml) to injectExitPlanModehooks that execute theplannotatorcommand automatically.- [DYNAMIC_CONTEXT_INJECTION]: The
scripts/setup-opencode-plugin.shscript registers an OpenCode slash command (/plannotator-annotate) using the!commandsyntax: `!`plannotator annotate "$ARGUMENTS". This pattern executes shell commands at runtime with user-supplied arguments, which could lead to command injection if the$ARGUMENTSvariable is not properly sanitized by the platform. - [INDIRECT_PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the processing of untrusted agent-generated content.
- Ingestion points: The tool reads agent-generated implementation plans and git diffs through automated hooks and the
scripts/review.shscript. - Boundary markers: There are no explicit delimiters or instructions provided to the agent to disregard instructions embedded within the plans being reviewed.
- Capability inventory: The skill possesses capabilities for file system modification (writing to Obsidian vaults), network interaction (triggering browser sessions and Bear callback URLs), and executing subprocesses via the
plannotatorCLI. - Sanitization: There is no evidence of sanitization or structural validation performed on the plan content before it is passed to the review UI or saved to notes.
Recommendations
- HIGH: Downloads and executes remote code from: https://plannotator.ai/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata