plugin-lifecycle
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill performs destructive operations using shell commands on paths constructed through variable interpolation. Evidence: In
references/installation-process.md,references/uninstallation-process.md, andreferences/mode-4-destroy.md, therm -rfcommand is executed on paths incorporating thePRODUCT_NAMEvariable, which is parsed from a project-level file. - COMMAND_EXECUTION (MEDIUM): The skill terminates a macOS system background service. Evidence:
references/cache-management.mdexecuteskillall AudioComponentRegistrarto force a rebuild of the Audio Unit database. - PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection via the project metadata it processes. Ingestion points: Data is ingested from
plugins/$PLUGIN_NAME/CMakeLists.txtandPLUGINS.md. Boundary markers: Absent; external data is interpolated directly into shell script strings. Capability inventory:Bashwith permissions to copy, remove, and modify files. Sanitization: Employs basicsedandgrepfor string extraction, which does not provide security-grade sanitization against path traversal or shell metacharacter injection if the input files are crafted by an attacker.
Audit Metadata