marketplace-structure
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
🔴 VERDICT: HIGH
This skill describes the structure and management of plugin marketplaces. The primary security concern stems from the inherent design of a plugin system that allows for arbitrary command execution and external code fetching. While the skill itself is documentation and provides good security recommendations, the capabilities it describes pose a HIGH risk if not managed carefully by the user.
Total Findings: 4
🔴 HIGH Findings: • Arbitrary Command Execution via Plugin Hooks/Servers
- references/schema-reference.md: The
hooksandmcpServersfields within a plugin entry can specify acommandto be executed. For example,"command": "${CLAUDE_PLUGIN_ROOT}/scripts/validate.sh"or"command": "${CLAUDE_PLUGIN_ROOT}/servers/db-server". While the examples use relative paths within the plugin, a malicious plugin could define an arbitrary command, leading to code execution on the user's system if an untrusted plugin is installed and its hooks or servers are triggered.
🟡 MEDIUM Findings: • Unverified External Plugin Downloads
- SKILL.md, examples/, references/: The marketplace system allows plugins to be sourced from arbitrary GitHub repositories (
owner/repo) or Git URLs (https://gitlab.com/team/plugin.git). While the skill is documentation and does not perform these downloads itself, it instructs the user on how to configure a system that will. Installing plugins from untrusted external sources without thorough vetting poses a significant risk of introducing malicious code. The skill does provide recommendations for plugin verification, which is crucial.
🔵 LOW Findings: • Credentials Management Awareness
- SKILL.md, references/distribution-patterns.md: The skill describes the use of environment variables like
GITHUB_TOKEN,GITLAB_TOKEN, andBITBUCK_TOKENfor authenticating with private repositories. While this is a standard and necessary mechanism for accessing private resources, it highlights a point of security awareness for users. Mishandling these tokens (e.g., hardcoding, exposing them) could lead to unauthorized access. The skill explicitly recommends "No credentials in marketplace.json", which is a good practice.
ℹ️ INFO Findings: • Indirect Prompt Injection Risk in Metadata
- SKILL.md, references/schema-reference.md: Various string fields within
marketplace.jsonandplugin.json(e.g.,name,description,keywords,authorfields) can contain arbitrary text. A malicious marketplace or plugin author could embed prompt injection attempts within these metadata fields, potentially influencing the AI's behavior when it processes this information. This is a risk of the data processed by the system, not the skill's instructions directly.
================================================================================
- AI detected serious security threats