wordpress-remote-cli

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). The raw GitHub URL points to a direct install.sh served from an unfamiliar repo and is used with a curl | bash pattern (high-risk for running arbitrary code), while the example.com image is benign; overall the presence of the executable shell script makes this set suspicious.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). wpklx dynamically discovers and fetches runtime content and routes from arbitrary WordPress sites via their /wp-json REST API (e.g., discover, post list/get, media upload, and examples that mirror or pipe post content), which exposes the agent to untrusted user-generated posts, comments, media, and plugin-provided resources.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 08:04 PM