openviking-memory
Pass
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: SAFE
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill implements a long-term memory system which acts as an ingestion point for data that could potentially contain malicious instructions from previous interactions.
- Ingestion points: The
memory_recalltool and theautoRecallfeature described inSKILL.mdretrieve historical data and inject it into the prompt context. - Boundary markers: The documentation does not specify the use of delimiters or boundary markers to isolate retrieved memories from current instructions.
- Capability inventory: The skill interacts with local
openvikingandopenclawservices to manage state and configuration. - Sanitization: No explicit sanitization of retrieved memory content is mentioned in the tool definitions.
- [COMMAND_EXECUTION]: The skill includes standard configuration and management commands for the
openviking-serverandopenclawCLI utilities. - [EXTERNAL_DOWNLOADS]: The documentation references a setup helper executed via
npx, which is a standard procedure for configuring Node.js-based plugins in the specified environment.
Audit Metadata