wp-plugins
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (LOW): The file 'resources/build-deploy.md' provides instructions for implementing 'YahnisElsts/plugin-update-checker'. This library enables plugins to poll GitHub for updates and execute code locally. While widely used in the ecosystem, the source is not on the predefined trusted organization list. Additionally, the skill references the 'softprops/action-gh-release' GitHub Action for CI/CD automation.
- Indirect Prompt Injection (LOW): The implementation of 'Settings_Page' in 'resources/settings-api.md' represents an ingestion surface for untrusted user input. 1. Ingestion point: The 'sanitize' method processes input for settings fields; 2. Boundary markers: None; 3. Capability inventory: Uses 'register_setting' to write values to the database; 4. Sanitization: Present (uses 'sanitize_text_field' and 'absint'). The risk is low as the template demonstrates proper WordPress security patterns.
- Command Execution (INFO): The 'resources/wp-cli.md' file details the registration of custom WP-CLI commands and provides examples of database operations ('DELETE' queries) and search-replace tasks. These are standard administrative capabilities and do not incorporate unvalidated external data in a dangerous manner.
Audit Metadata