wordpress-admin

Warn

Audited by Socket on Mar 18, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/wp-seo.py

No evidence of intentionally malicious code (no backdoor, exfiltration, or obfuscation). However, the module uses subprocess.run(..., shell=True) with user-controlled inputs (post_id and command fragments), which creates a command injection / remote code execution vulnerability. Treat this as a moderate-to-high security risk for supply-chain use: safe to use only after fixing the shell invocation (use argument array or strict validation) or restricting who can call the script. Hardcoded site URLs and container names are informational but not secrets.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 18, 2026, 10:48 PM
Package URL
pkg:socket/skills-sh/crazyswami%2Fwordpress-dev-skills%2Fwordpress-admin%2F@67af47942c5da29a3a9136f080136be4a6386afb