mem0-test-integration

Pass

Audited by Gen Agent Trust Hub on May 6, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Fetches documentation, schemas, and companion skills from the vendor's official domain (docs.mem0.ai) and GitHub repository (github.com/mem0ai/mem0).
  • [COMMAND_EXECUTION]: Installs project dependencies using native tools like pip, npm, pnpm, or yarn.
  • [COMMAND_EXECUTION]: Executes shell commands defined in the E2E recipe section of the local .mem0-integration/plan.md file, presenting a command execution surface.
  • [CREDENTIALS_UNSAFE]: Accesses MEM0_API_KEY and OPENAI_API_KEY from the environment to facilitate authenticated smoke testing.
  • [DATA_EXFILTRATION]: Performs network calls to Mem0 or OpenAI APIs during verification steps.
  • [PROMPT_INJECTION]: Ingests and processes untrusted data from local integration artifacts. 1. Ingestion points: .mem0-integration/plan.md and .mem0-integration/product.json. 2. Boundary markers: Not present. 3. Capability inventory: Includes dependency installation, shell command execution, and network access. 4. Sanitization: No sanitization is performed on commands read from the plan before execution.
Audit Metadata
Risk Level
SAFE
Analyzed
May 6, 2026, 09:54 AM