plugin-master
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill documentation and
publishing-guide.mdprovide instructions for adding third-party 'marketplaces' and installing plugins directly from GitHub repositories (/plugin marketplace add user/repo). This pattern facilitates the introduction of unverified code into the user's environment. - REMOTE_CODE_EXECUTION (MEDIUM): The
component-patterns.mdandfull-plugin.mdfiles include examples of Model Context Protocol (MCP) server configurations that usenpx -y @package(e.g.,@stripe/mcp-server,@modelcontextprotocol/server-postgres). This command automatically downloads and executes code from the npm registry without version pinning or integrity verification. - COMMAND_EXECUTION (MEDIUM): The skill utilizes a 'hooks' system (
hooks/hooks.json) that automatically executes shell scripts (bash,node) in response to agent events likePostToolUseorSessionStart. This creates a vector where a malicious plugin can execute arbitrary code silently in the background whenever the agent performs routine tasks. - DATA_EXFILTRATION (LOW): Examples in
component-patterns.mddemonstrate the use of sensitive environment variables such asSTRIPE_API_KEYandDATABASE_URL. While using placeholders is a best practice, the architectural pattern of passing these secrets to MCP servers or scripts increases the risk surface for exfiltration if a malicious plugin is installed.
Audit Metadata