wordpress-gutenberg-expert
Warn
Audited by Socket on Mar 28, 2026
1 alert found:
AnomalyAnomalyagents/content/content-import.md
LOWAnomalyLOW
agents/content/content-import.md
No direct evidence of overt malware (exfiltration, backdoors, or suspicious outbound networking) is present in the shown fragment. The main security concern is the dynamic execution primitive `wp eval-file` used to run a local importer PHP file, which can become a serious code-execution vector if the evaluated file/contents can be tampered with. Additionally, the scripts import remote SQL and perform DB-wide rewriting and state-changing operations; if source artifacts or parameters are untrusted, compromise impact increases substantially. Use only with trusted artifacts/targets and protect the workspace/importer file integrity.
Confidence: 62%Severity: 56%
Audit Metadata