claudian-installer

Warn

Audited by Gen Agent Trust Hub on Mar 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONNO_CODE
Full Analysis
  • [COMMAND_EXECUTION]: The installation process uses shell commands (mkdir and cp) to deploy files into the user's local Obsidian vault directory.
  • [COMMAND_EXECUTION]: The plugin itself is explicitly described as providing 'full agentic capabilities,' which includes the execution of bash commands and full file system access (read/write/search). These are high-privilege operations that could be exploited if the plugin is not properly secured.
  • [NO_CODE]: The skill references a main.js file in the assets directory which contains the actual plugin logic. This file was not provided for analysis, meaning the most sensitive part of the code remains unvetted.
  • [COMMAND_EXECUTION]: There is an author mismatch between the skill (chujianyun) and the plugin manifest (Yishen Tu). This indicates that the skill is packaging third-party code, which increases the risk if the provenance of the plugin files cannot be established.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 17, 2026, 06:43 AM