wp-block-themes
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill targets external WordPress project files for reading and modification. \n
- Ingestion points: Processes files in
templates/*.html,parts/*.html,patterns/*.php, andtheme.jsonfrom targeted repositories. \n - Boundary markers: No specific delimiters or instructions are provided to the agent to treat content within these files as untrusted or to ignore embedded instructions. \n
- Capability inventory: The skill allows for file modification (
theme.json, templates, parts) and command execution vianodescripts andWP-CLI. \n - Sanitization: No sanitization or validation logic is defined for the external content before it is processed or used in operations. \n- Unverifiable Dependencies (MEDIUM): The skill executes external scripts not included in the provided file. \n
- Evidence: Calls to
node skills/wp-project-triage/scripts/detect_wp_project.mjsandnode skills/wp-block-themes/scripts/detect_block_themes.mjs. Without the source of these scripts, their safety cannot be verified. \n- Command Execution (LOW): UsesnodeandWP-CLIto perform theme detection and management tasks. While standard for this workflow, it provides the mechanism for potential exploit if paired with a successful injection.
Recommendations
- AI detected serious security threats
Audit Metadata