neovim
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Executes shell commands using the
nvimbinary to communicate with a running Neovim server instance. It specifically targets the local Unix socket provided by the$NVIMenvironment variable. - [COMMAND_EXECUTION]: Performs dynamic code execution within the Neovim editor context by evaluating Lua and Vimscript snippets via the
--remote-exprand--remote-sendflags. This is used to query buffer names, LSP status, and plugin configurations. - [COMMAND_EXECUTION]: Accesses the local file system through Neovim APIs like
nvim_get_runtime_fileandstdpathto locate documentation and plugin source code. - [SAFE]: Implements specific filtering logic to suppress
NVIM_APPNAMEwarnings that could otherwise interfere with the parsing of command output.
Audit Metadata