NYC

zellij-plugin-dev

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • EXTERNAL_DOWNLOADS (HIGH): The project setup instructions recommend executing a command that downloads a remote WebAssembly file directly from GitHub and runs it within the Zellij environment.
  • Evidence: zellij plugin -f -- https://github.com/zellij-org/create-rust-plugin/releases/latest/download/create-rust-plugin.wasm found in the 'Project Setup' section.
  • REMOTE_CODE_EXECUTION (HIGH): By downloading and immediately executing a WASM binary from a non-whitelisted GitHub organization (zellij-org), the skill encourages a workflow that executes unverified remote code.
  • COMMAND_EXECUTION (LOW): The skill provides instructional code snippets for the run_command API, which allows plugins to execute arbitrary host commands (e.g., git status). While this is a standard feature of the development framework, it represents a capability that could be misused in a malicious plugin.
  • Evidence: Example usage of run_command(vec!["git", "status"], context); in the 'Command Execution with Context' section.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 03:19 AM