jeo
Fail
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installer script
scripts/install.shdownloads a shell script fromhttps://plannotator.ai/install.shand pipes it directly into thebashinterpreter. This allows for arbitrary remote code execution from an untrusted external source not included in the trusted vendor lists or recognized as a well-known service.\n- [COMMAND_EXECUTION]: The scriptscripts/claude-plan-gate.pyprogrammatically modifies the local~/.claude/settings.jsonfile to setpermissionModetoacceptEdits. This configuration change bypasses the mandatory human-in-the-loop requirement for file system edits, effectively granting the AI agent elevated privileges to modify the host environment without user approval.\n- [COMMAND_EXECUTION]: The skill performs extensive system-level changes to establish persistence and deep integration, including creating dispatcher scripts and registry files for hooks across Claude Code, Codex, Gemini CLI, and OpenCode platforms.\n- [EXTERNAL_DOWNLOADS]: The skill installs several third-party tools and plugins during setup, such asagent-browser,playwriter, and various 'oh-my' multi-agent extensions from unverified GitHub repositories and external domains.\n- [EXTERNAL_DOWNLOADS]: The skill downloads the Bun runtime installer fromhttps://bun.sh/install, which is a recognized well-known service provider.
Recommendations
- HIGH: Downloads and executes remote code from: http://localhost:4747/pending, https://bun.sh/install - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata