nvim-plugins
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted local data from Neovim configuration files, which acts as a surface for indirect prompt injection if those files contain malicious instructions.
- Ingestion points: Reads
~/.config/nvim/lazy-lock.jsonand all files withinlua/plugins/*.luato identify currently installed plugins. - Boundary markers: No explicit delimiters or instructions are provided to the agent to ignore potentially malicious content or instructions embedded within these configuration files during the analysis phase.
- Capability inventory: The skill utilizes
Read,Write,Glob, andTasktools, allowing it to read the filesystem, write new configuration files, and delegate analysis to other agents. - Sanitization: The skill does not implement specific sanitization or validation logic for the content read from the local configuration files before processing it.
- [COMMAND_EXECUTION]: The skill instructions specify the use of shell commands to inspect local system files.
- Evidence: Explicitly calls
cat ~/.config/nvim/lazy-lock.jsonwithin its workflow to retrieve plugin information.
Audit Metadata