memory
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill identifies an indirect prompt injection surface where data from a project memory file is ingested into the agent context without safeguards.\n
- Ingestion points: The skill reads from
.claude/memories/project_memory.json(or.memories/project_memory.json) to load persistent context.\n - Boundary markers: Absent. The instructions in
SKILL.mdcommand the agent to 'apply memories silently' and 'incorporate remembered preferences... without announcing them', providing no separation between system instructions and untrusted memory data.\n - Capability inventory: The skill utilizes
ReadandWritetools to interact with the file system and relies on thescripts/manage-memory.pyutility for record management.\n - Sanitization: Absent. There is no evidence of validation or escaping for the content loaded from the JSON memory file before it influences agent behavior.\n- [EXTERNAL_DOWNLOADS]: The skill requires the installation of an external plugin from an unverified third-party author.\n
- Evidence:
SKILL.mdlists theClaude Never Forgetsplugin (/plugin install yldrmahmet/claude-never-forgets) as a prerequisite. This directs the user to install code from an unverified repository.
Audit Metadata