zellij-plugin-dev
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The project setup instructions recommend executing a command that downloads a remote WebAssembly file directly from GitHub and runs it within the Zellij environment.
- Evidence:
zellij plugin -f -- https://github.com/zellij-org/create-rust-plugin/releases/latest/download/create-rust-plugin.wasmfound in the 'Project Setup' section. - REMOTE_CODE_EXECUTION (HIGH): By downloading and immediately executing a WASM binary from a non-whitelisted GitHub organization (
zellij-org), the skill encourages a workflow that executes unverified remote code. - COMMAND_EXECUTION (LOW): The skill provides instructional code snippets for the
run_commandAPI, which allows plugins to execute arbitrary host commands (e.g.,git status). While this is a standard feature of the development framework, it represents a capability that could be misused in a malicious plugin. - Evidence: Example usage of
run_command(vec!["git", "status"], context);in the 'Command Execution with Context' section.
Recommendations
- AI detected serious security threats
Audit Metadata