iwe-memory-system
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface. It directs the agent to ingest and analyze untrusted data from markdown notes in the local workspace, while providing the agent with tools to modify the environment.
- Ingestion points: Notes are retrieved and explored using
iwe find,iwe retrieve, andiwe tree(documented inSKILL.mdandreferences/read-and-navigate.md). - Boundary markers: No explicit delimiters or instruction-ignoring warnings are used when the agent processes the content of these notes.
- Capability inventory: The agent can use
iwe new,iwe rename,iwe delete,iwe extract, andiwe inlineto create, modify, or remove files in the local filesystem (documented inreferences/write-and-refactor.md). - Sanitization: No explicit sanitization or validation of the note content is performed before the agent acts upon it.
- [COMMAND_EXECUTION]: The skill relies on executing the
iwecommand-line interface to perform its primary functions. This includes project discovery, structural refactoring, and data analysis through shell commands and pipes. - Usage examples: The skill provides numerous examples of CLI usage, such as
iwe find,iwe retrieve, and analytical chains likeiwe stats -f csv | tail -n +2 | sort -t, -k12 -nr | head -5. - Guardrails: For high-impact commands like
iwe deleteandiwe normalize, the skill correctly advises the use of--dry-runand explicit user intent to mitigate the risk of unintended modifications.
Audit Metadata