wordpress-setup
Warn
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
sudoto move the WP-CLI binary into the/usr/local/binsystem directory, which requires elevated administrative privileges. - [COMMAND_EXECUTION]: Configuration patterns for SSH aliases include the
-o StrictHostKeyChecking=noflag. This disables the verification of the remote host's identity, increasing susceptibility to Man-in-the-Middle (MitM) attacks. - [EXTERNAL_DOWNLOADS]: The skill fetches the WP-CLI Phar executable from the official
wp-clirepository on GitHub. - [EXTERNAL_DOWNLOADS]: The skill installs the
wp-cli/ssh-commandpackage from the official WP-CLI package registry to enable remote management capabilities. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes data from external WordPress sites (such as post titles and user lists) which could contain malicious instructions.
- Ingestion points:
SKILL.md(Step 4, Step 2 Option B) andreferences/wp-cli-essentials.md(Diagnostic Commands). - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the workflows.
- Capability inventory: The skill has access to shell commands (
wp), network operations (curl), and privilege escalation (sudo). - Sanitization: There is no evidence of sanitization or validation performed on the data retrieved from the WordPress sites before it is processed by the agent.
Audit Metadata