wp-block-development
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill references and suggests using packages from the
@wordpressnpm scope (e.g.,@wordpress/scripts,@wordpress/create-block,@wordpress/env). While these are standard for WordPress development, this organization is not on the predefined list of trusted GitHub organizations.\n- [COMMAND_EXECUTION] (LOW): The procedure involves executing shell commands (npm run build,wp-cli) and local Node.js scripts (detect_wp_project.mjs,list_blocks.mjs) that were not provided in the analyzed file set.\n- [PROMPT_INJECTION] (LOW): Indirect Prompt Injection surface: The skill is designed to ingest and process files from a WordPress repository (includingblock.jsonand PHP/JS source code). 1. Ingestion points:block.json,.php, and.jsfiles. 2. Boundary markers: No delimiters or explicit 'ignore instructions' warnings are present in the documentation. 3. Capability inventory: Filesystem access and execution ofbash,node, andwp-clicommands. 4. Sanitization: No sanitization or validation of the ingested code/metadata is specified.
Audit Metadata