wp-plugin-review
Warn
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/setup_tools.shscript utilizessudo apt-get installto install PHP and system-level dependencies required for the audit environment. - [REMOTE_CODE_EXECUTION]: The skill's workflow involves running
phpuniton files within the/home/claude/plugin-under-review/directory. Since PHPUnit executes the code it is testing, a maliciously crafted plugin could achieve code execution on the agent's system. - [EXTERNAL_DOWNLOADS]: The setup script fetches the Composer installer from
https://getcomposer.org/installerand various security tools (PHPCS, PHPStan, PHPUnit) from official registries. These downloads are from well-known technology services and are documented neutrally. - [PROMPT_INJECTION]: The skill processes untrusted code from user-uploaded ZIP files or folders, creating a surface for indirect prompt injection. 1. Ingestion points: Plugin source files located in
/mnt/user-data/uploads/. 2. Boundary markers: The workflow does not define specific delimiters or instructions to ignore embedded prompts during the analysis phase. 3. Capability inventory: The agent has the ability to execute system commands via subprocesses and write report files to the filesystem. 4. Sanitization: There is no sanitization or content validation performed on the plugin source code before it is analyzed by the agent.
Audit Metadata