wp-trac-search
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
scripts/search.phpscript usescurlto fetch ticket data fromhttps://core.trac.wordpress.org. This is the official ticket tracker for the WordPress project, which is a well-known and trusted service. - [COMMAND_EXECUTION]: The skill utilizes the Bash tool to execute a local PHP script (
search.php). The agent is instructed to dynamically build command-line arguments (such as--summaryand--description) based on the user's search criteria. - [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection.
- Ingestion points: Untrusted, user-contributed content (ticket summaries and descriptions) is ingested from the WordPress Trac tracker via the
scripts/search.phpscript. - Boundary markers: Absent. The search results are returned as a markdown table without clear delimiters or instructions to ignore potential commands embedded in the ticket data.
- Capability inventory: The agent can execute bash commands via the tool definition in
SKILL.mdand perform network requests via the search script. - Sanitization: Absent. While the PHP script escapes markdown pipes to maintain table structure, it does not sanitize the text content for malicious instructions or prompt injection patterns.
Audit Metadata