wp-plugins

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOWEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • Unverifiable Dependencies & Remote Code Execution (LOW): The file 'resources/build-deploy.md' provides instructions for implementing 'YahnisElsts/plugin-update-checker'. This library enables plugins to poll GitHub for updates and execute code locally. While widely used in the ecosystem, the source is not on the predefined trusted organization list. Additionally, the skill references the 'softprops/action-gh-release' GitHub Action for CI/CD automation.
  • Indirect Prompt Injection (LOW): The implementation of 'Settings_Page' in 'resources/settings-api.md' represents an ingestion surface for untrusted user input. 1. Ingestion point: The 'sanitize' method processes input for settings fields; 2. Boundary markers: None; 3. Capability inventory: Uses 'register_setting' to write values to the database; 4. Sanitization: Present (uses 'sanitize_text_field' and 'absint'). The risk is low as the template demonstrates proper WordPress security patterns.
  • Command Execution (INFO): The 'resources/wp-cli.md' file details the registration of custom WP-CLI commands and provides examples of database operations ('DELETE' queries) and search-replace tasks. These are standard administrative capabilities and do not incorporate unvalidated external data in a dangerous manner.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 06:38 AM