skills/fredrikaverpil/dotfiles/neovim/Gen Agent Trust Hub

neovim

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: Executes shell commands using the nvim binary to communicate with a running Neovim server instance. It specifically targets the local Unix socket provided by the $NVIM environment variable.
  • [COMMAND_EXECUTION]: Performs dynamic code execution within the Neovim editor context by evaluating Lua and Vimscript snippets via the --remote-expr and --remote-send flags. This is used to query buffer names, LSP status, and plugin configurations.
  • [COMMAND_EXECUTION]: Accesses the local file system through Neovim APIs like nvim_get_runtime_file and stdpath to locate documentation and plugin source code.
  • [SAFE]: Implements specific filtering logic to suppress NVIM_APPNAME warnings that could otherwise interfere with the parsing of command output.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 09:24 AM