wordpress-gutenberg-expert

Warn

Audited by Socket on Mar 28, 2026

1 alert found:

Anomaly
AnomalyLOW
agents/content/content-import.md

No direct evidence of overt malware (exfiltration, backdoors, or suspicious outbound networking) is present in the shown fragment. The main security concern is the dynamic execution primitive `wp eval-file` used to run a local importer PHP file, which can become a serious code-execution vector if the evaluated file/contents can be tampered with. Additionally, the scripts import remote SQL and perform DB-wide rewriting and state-changing operations; if source artifacts or parameters are untrusted, compromise impact increases substantially. Use only with trusted artifacts/targets and protect the workspace/importer file integrity.

Confidence: 62%Severity: 56%
Audit Metadata
Analyzed At
Mar 28, 2026, 12:36 PM
Package URL
pkg:socket/skills-sh/truchot%2Fclaude-skills-test%2Fwordpress-gutenberg-expert%2F@0830d28dd529067d31d18e81470cb79c4e5826b8