manage-memory
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The integrity check in Step 6 uses a shell
forloop to iterate over links extracted fromMEMORY.mdusinggrep. The extracted filenames are interpolated directly into anlscommand without quoting or sanitization. IfMEMORY.mdcontains a malicious link with shell metacharacters (e.g.,[test](; rm -rf / ;)), the command could execute arbitrary shell code. - [PROMPT_INJECTION]: Indirect Prompt Injection surface detected (Category 8).
- Ingestion points: Content is read from
MEMORY.mdand other topic files in the memory directory (SKILL.md, Step 6). - Boundary markers: None. Content extracted via regex is treated as trusted input for shell execution.
- Capability inventory: Uses
Bashfor integrity checks andWrite/Editfor file management. - Sanitization: Absent. Filenames extracted from markdown links are passed directly to the shell environment.
Audit Metadata