Maxi AI Core exposes theDocumentation Index
Fetch the complete documentation index at: https://docs.maxicore.ai/llms.txt
Use this file to discover all available pages before exploring further.
maxi/run-wp-cli ability (Pro, requires manage_options) so AI agents can run WP-CLI commands against your WordPress site. To keep your site safe, the ability uses a strict allowlist: read-only commands are always permitted, and write commands are blocked by default until you explicitly enable each group in wp-config.php.
maxi/run-wp-cli requires a Pro license and a WordPress user with the manage_options capability. Agents authenticated as lower-privilege users cannot call this ability.Read-only commands (always permitted)
The following command prefixes — and others like them — are allowed without any configuration:option getpost listcore versionwc tool listwc log readplugin listtheme listuser listdb size
Enabling write groups
Write commands are blocked by default. To enable a group, add the corresponding constant to yourwp-config.php file above the /* That's all, stop editing! */ line.
DB query access
When you enableMAXI_AI_WP_CLI_ALLOW_DB_READS, agents can run db query with SELECT statements and db export to back up the database. Non-SELECT queries (INSERT, UPDATE, DELETE, DROP) are rejected even with this constant set.
DB query blocklist
The DB query blocklist adds a second safety layer on top of the SELECT-only restriction. On first use, the plugin automatically seeds the blocklist with these defaults:user_passuser_activation_keysession_tokens
db query call is checked twice against this list:
- Pre-execution — if the SQL text contains a blocked term (for example,
SELECT user_pass FROM wp_users), the query is rejected before it runs. - Post-execution — if the query output contains a blocked term (for example, a
SELECT *result that includes auser_passcolumn), the output is rejected and not returned to the agent.
wp_cli.
You can manage the blocklist via the maxi/manage-db-query-blocklist ability:
Hard-banned commands
Certain commands are always rejected, regardless of which constants you define. No constant can enable them:- Commands containing shell metacharacters (
;,|,&,`,$) — the ability accepts WP-CLI command text only, not shell command text. - Destructive or sensitive commands such as
db drop,eval,config set, anduser delete.
wp_cli with the reason, the matched prefix, and the raw command.
Example ability call
command value is a WP-CLI command string without the leading wp. Shell metacharacters are rejected before execution — only WP-CLI command text is accepted, not shell commands.
Security recommendations
Enable only the groups you need
Enable only the groups you need
Each write group grants access to a meaningful set of commands. Enable
MAXI_AI_WP_CLI_ALLOW_OPTION_WRITES only if your agent workflow genuinely requires adding or changing site options. The same principle applies to every group.Use dedicated WordPress users for agents
Use dedicated WordPress users for agents
Assign each AI agent its own WordPress user. If an agent does not need write access, assign it a role without
manage_options. The maxi/run-wp-cli ability is blocked for those agents at the capability level.Review the audit log
Review the audit log
All WP-CLI calls — including blocked and rejected ones — are recorded in the audit log. Query them with
maxi/get-audit-events using category: "wp_cli" to review what commands your agents have attempted.Test on staging first
Test on staging first
WP-CLI write commands execute immediately. There is no dry-run mode. Test any new write group on a staging site before enabling it in production.