agent-memory
Pass
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill implements a persistent memory system which introduces a surface for indirect prompt injection. Malicious instructions could potentially be stored in the memory and later retrieved during a conversation.
- Ingestion points: Data is retrieved from the Lakebase store via the
get_user_memorytool inexamples/memory_tools.py. - Boundary markers: The tools do not implement specific delimiters or instructions to ignore embedded commands within the retrieved memory content.
- Capability inventory: The skill provides tools for reading (
get_user_memory), writing (save_user_memory), and deleting (delete_user_memory) persistent data. - Sanitization: The
save_user_memorytool performs JSON structure validation to ensure inputs are dictionary objects, but it does not sanitize content for natural language instructions. - [COMMAND_EXECUTION]: The documentation provides shell commands for initializing database tables and testing the agent's memory tools locally using
curl,python, anddatabricks auth token. These are intended for developer use during the integration process. - [EXTERNAL_DOWNLOADS]: The skill requires the
databricks-langchainpackage and references template code hosted on Databricks' official GitHub organization. These are vendor-owned resources.
Audit Metadata