nvr-open
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/open.shaccepts aLINEargument and interpolates it directly into thenvrcommand as+"$LINE". Neovim interprets strings following the+flag as Ex commands. An attacker can provide an input such as:!touch /tmp/pwnedinstead of a numeric line to execute arbitrary shell commands on the host. - [PROMPT_INJECTION]: The skill instructions direct the agent to extract line numbers from user requests or search results. This creates an indirect prompt injection vector where a malicious file could contain text that tricks the agent into passing a Neovim command string as the 'line number' argument.
- [COMMAND_EXECUTION]: The
SKILL.mdfile uses dynamic execution markers (e.g.,!pwd,!$CLAUDE_PLUGIN_ROOT/scripts/nvr-discover) that execute shell commands to populate documentation fields. This represents an additional command execution surface that relies on the environment's security posture.
Audit Metadata