ignore
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityFunctionally, the file documents a benign helper for managing per-user ignore patterns. No explicit malicious payloads, hard-coded credentials, or remote endpoints are present in the supplied text. However, there are meaningful supply-chain and command-injection risks: (1) the invocation executes an external plugin script located via an environment variable (CLAUDE_PLUGIN_ROOT), which can be abused if the environment or plugin contents are compromised; and (2) $ARGUMENTS are passed unquoted into a shell invocation, enabling word-splitting or injection if inputs are not sanitized. Because manage-ignore.sh was not provided, unknown behaviors inside that script (including network activity or access to other files) cannot be excluded — review that script before use. Recommended actions: quote and validate arguments, restrict/verify plugin provenance, and audit the manage-ignore.sh script.