code-memory-router
Pass
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill defines several shell commands for search and indexing, including
qmd query,qmd search, andpython -m mempalace search. These commands are intended to be executed with user-supplied strings, which can be an entry point for command injection if not properly handled by the agent. - [EXTERNAL_DOWNLOADS]: The skill documentation recommends the installation of external third-party tools from GitHub repositories (
tobil/qmdandmempalace/mempalace) to provide its core search and memory functionality. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection (Category 8) due to its core function of retrieving and processing external project data.
- Ingestion points: Data is ingested from codebase search results (QMD) and persistent project memory (MemPalace), as described in
SKILL.mdandreferences/tool_selection.md. - Boundary markers: The instructions do not provide specific delimiters or instructions to the agent to treat retrieved content as untrusted data.
- Capability inventory: The skill has the ability to execute shell commands and read project files via the
scripts/inspect_embedding_metadata.pyhelper script. - Sanitization: There is no evidence of sanitizing or validating the retrieved content before it is incorporated into the agent's context.
Audit Metadata