claude-code-plugin-hacker
Warn
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses and reads sensitive application configuration and cache files located in the
~/.claude/directory, includingsettings.jsonand plugin metadata. While this is aligned with the skill's stated purpose, it exposes user settings and plugin internals to the agent context. - [COMMAND_EXECUTION]: The skill performs bulk file system operations using
find,chmod,sed, andrmto modify plugin scripts and cache metadata. It specifically targets executable permissions and script content, including patterns that suppress script errors (2>/dev/null || true), which can reduce the auditability of the plugin system. - [REMOTE_CODE_EXECUTION]: The Phase 4 verification logic extracts command strings from
hooks.jsonfiles and executes them usingeval. This constitutes dynamic execution of commands defined in external configuration files, which could lead to arbitrary code execution if a plugin's cache or manifest has been compromised.
Audit Metadata