WordPress REST API CLI
Analysis
This appears to be a legitimate WordPress REST API CLI, but it gives an agent credentialed ability to create, update, delete, and make raw requests against a WordPress site, so it should be reviewed and constrained before use.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Posts: ... `posts:create`, `posts:update`, `posts:delete` ... Pages: ... `pages:create`, `pages:update`, `pages:delete` ... Advanced: - `request` (raw method + path)
The skill explicitly exposes WordPress content mutation, deletion, and a raw method/path request capability. These are purpose-aligned but high-impact if an agent can invoke them without a separate user confirmation or site-specific limits.
"ownerId": "kn7ehv4at8yekzag31spcarxm180bev0", "slug": "wordpress"
The bundled metadata identity differs from the provided registry metadata, which lists a different owner ID and slug. This does not show malicious behavior, but it is a provenance inconsistency.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const basicToken = process.env.WP_BASIC_TOKEN; ... const appPassword = process.env.WP_APP_PASSWORD; ... const jwt = process.env.WP_JWT_TOKEN;
The CLI reads WordPress credentials from environment variables and uses them for Authorization headers. This is expected for the integration, but those credentials carry the WordPress account's permissions.
