importing-chatgpt-memory
Pass
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: SAFE
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted data from ChatGPT export files, which contains user-controlled conversation history. This represents an indirect prompt injection surface where malicious instructions could be embedded in the data being processed.
- Ingestion points: ChatGPT conversation JSON shards (processed via scripts such as
scripts/extract-saved-memory.pyandscripts/render-conversation.py). - Boundary markers: Absent. The rendered output does not use unique delimiters to separate untrusted content from system instructions.
- Capability inventory: The skill can write to active system memory (
system/human.md), perform git operations, and dispatch subagents with shell capabilities. - Sanitization: Absent. The scripts perform text normalization but do not sanitize for potential prompt injection patterns.
- [COMMAND_EXECUTION]: The skill executes local Python scripts and shell commands to manage the import process.
- Evidence:
scripts/export-transcripts.pyusessubprocess.runto execute the localrender-conversation.pyscript using the current Python interpreter. - Evidence:
SKILL.mdinstructs the agent to rungitcommands for version control of the memory directory and to dispatch subagents with shell access for parallel processing.
Audit Metadata