memory-jq

Fail

Audited by Socket on Mar 5, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

This utility is a local jq-based memory editor that, when implemented carefully (using jq --arg/--argjson, avoiding shell interpolation, enforcing JSON validation after writes, and restricting writable paths/fields), is low risk. The primary risks identified are: (1) command injection if user inputs are interpolated into shell commands unsafely, (2) sensitive-data exposure via get operations to stdout/logs, and (3) potential file corruption if validation is not enforced. I assess moderate security risk if the implementation naively composes shell commands from unsanitized arguments and lacks field-level restrictions. Recommended mitigations: always use jq --arg/--argjson or direct jq APIs rather than shell interpolation, validate JSON after writes and refuse writes that produce invalid JSON, whitelist allowable json-paths or fields to limit scope, avoid exposing sensitive fields via get without authorization, and restrict Bash execution privileges for this skill to prevent broader command execution.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 5, 2026, 11:49 PM
Package URL
pkg:socket/skills-sh/abilityai%2Fabilities%2Fmemory-jq%2F@454ab86dfd5256ba170c16af12ae87e09b08c259