skill-memory
Pass
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it ingests and processes content from local files, directories, and task artifacts.\n
- Ingestion points: Data enters the system through
file,directory, andtaskmodes, which read contents from various filesystem paths (documented inSKILL.md).\n - Boundary markers: The system uses Markdown for storage but lacks explicit boundary markers or 'ignore' instructions for the LLM when it later retrieves and processes these memories.\n
- Capability inventory: The skill can execute shell commands via
Bash, write or modify files, delete files usingrm, and performgitcommits.\n - Sanitization: There is no mention of content sanitization or filtering to prevent the inclusion of malicious instructions in the memory vault.\n- [COMMAND_EXECUTION]: The skill uses shell commands to perform vault maintenance and search operations.\n
- Evidence:
SKILL.mddefines workflows usinggrep,wc,bc,ls,git, andrm. Thegcsub-mode specifically performs permanent file deletion.\n - Control: The skill includes mandatory interactive requirements, explicitly instructing the agent to use
AskUserQuestionand wait for confirmation before any write or delete operations are performed.
Audit Metadata