claudian-installer
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONNO_CODE
Full Analysis
- [COMMAND_EXECUTION]: The installation process uses shell commands (mkdir and cp) to deploy files into the user's local Obsidian vault directory.
- [COMMAND_EXECUTION]: The plugin itself is explicitly described as providing 'full agentic capabilities,' which includes the execution of bash commands and full file system access (read/write/search). These are high-privilege operations that could be exploited if the plugin is not properly secured.
- [NO_CODE]: The skill references a main.js file in the assets directory which contains the actual plugin logic. This file was not provided for analysis, meaning the most sensitive part of the code remains unvetted.
- [COMMAND_EXECUTION]: There is an author mismatch between the skill (chujianyun) and the plugin manifest (Yishen Tu). This indicates that the skill is packaging third-party code, which increases the risk if the provenance of the plugin files cannot be established.
Audit Metadata