wp-cli
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Command Execution (MEDIUM): The skill provides instructions for high-risk administrative operations that can result in total data loss or system modification.
- Evidence: Commands such as
wp db reset(deletes database),wp user delete, andwp core updateare documented inSKILL.md. - Evidence: The skill explicitly lists 'Dangerous Commands' which are destructive by design.
- Remote Access and Execution (MEDIUM): The skill encourages the use of SSH for remote management and the configuration of SSH aliases in the local environment.
- Evidence: Examples like
ssh user@example.com "cd /var/www/html && wp plugin list"and the configuration of@prodaliases in~/.wp-cli/config.yml. - External Downloads (LOW): The skill utilizes commands that fetch and install code from external repositories (e.g., WordPress.org).
- Evidence:
wp plugin install plugin-namedownloads and executes third-party code. - Indirect Prompt Injection (LOW): The skill processes data from external WordPress sites which could contain malicious instructions designed to influence the agent.
- Ingestion points: Command outputs from
wp plugin list,wp user list, andwp post listinSKILL.md. - Boundary markers: Absent; command output is treated as trusted data.
- Capability inventory: Subprocess execution (
wp,ssh,rsync), file writing (tar,wp db export), and network operations (ssh). - Sanitization: Absent; the skill does not suggest sanitizing or validating command output before the agent acts on it.
Audit Metadata