skills/atxp-dev/cli/atxp-memory/Gen Agent Trust Hub

atxp-memory

Fail

Audited by Gen Agent Trust Hub on Feb 22, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (HIGH): The skill utilizes npx atxp@latest across all primary commands. This practice downloads and executes the most recent version of the 'atxp' package from npm at runtime without version pinning or integrity verification, allowing for arbitrary code execution if the package is compromised.
  • [DATA_EXFILTRATION] (MEDIUM): The push command facilitates the transfer of local .md files to external atxp.ai servers. Although restricted to markdown, these files frequently contain sensitive agent state, identity documents (e.g., SOUL.md), and private interaction logs.
  • [COMMAND_EXECUTION] (MEDIUM): The skill relies on shell command execution via the npx binary to perform its core functions.
  • [EXTERNAL_DOWNLOADS] (MEDIUM): The skill requires the installation of the @zvec/zvec package from an external registry for local indexing and search capabilities.
  • [PROMPT_INJECTION] (LOW): As an indirect prompt injection surface, the skill ingests untrusted data via memory pull (server files) and provides them to the agent via memory search. Ingestion points: File restoration from cloud and local search results. Boundary markers: None specified. Capability inventory: File writing (pull), network upload (push), and shell execution (npx). Sanitization: No evidence of sanitization for retrieved content.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 22, 2026, 11:42 PM