mem0-test-integration
Pass
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches documentation, schemas, and companion skills from the vendor's official domain (docs.mem0.ai) and GitHub repository (github.com/mem0ai/mem0).
- [COMMAND_EXECUTION]: Installs project dependencies using native tools like pip, npm, pnpm, or yarn.
- [COMMAND_EXECUTION]: Executes shell commands defined in the E2E recipe section of the local .mem0-integration/plan.md file, presenting a command execution surface.
- [CREDENTIALS_UNSAFE]: Accesses MEM0_API_KEY and OPENAI_API_KEY from the environment to facilitate authenticated smoke testing.
- [DATA_EXFILTRATION]: Performs network calls to Mem0 or OpenAI APIs during verification steps.
- [PROMPT_INJECTION]: Ingests and processes untrusted data from local integration artifacts. 1. Ingestion points: .mem0-integration/plan.md and .mem0-integration/product.json. 2. Boundary markers: Not present. 3. Capability inventory: Includes dependency installation, shell command execution, and network access. 4. Sanitization: No sanitization is performed on commands read from the plan before execution.
Audit Metadata