memory-manage
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is vulnerable to command injection due to the unsanitized interpolation of user-supplied input into shell command strings. In
phases/03-update-single.md, thetargetPathvariable is parsed from the$ARGUMENTSobject and directly embedded into multipleBashcommands, includingtest -d "${targetPath}",find "${targetPath}", andls "${targetPath}". A malicious user could provide a path containing shell metacharacters (e.g.,; rm -rf /) to execute arbitrary commands on the host system. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface when generating documentation or updating module memory. It utilizes an
Exploresub-agent to ingest and analyze untrusted content from the local project directory and then passes this information into prompts for theccw clitool and other sub-tasks. - Ingestion points: Local files located within the user-specified directory in
phases/03-update-single.md. - Boundary markers: No delimiters or instruction-isolation markers are present in the prompts to distinguish analyzed file content from system instructions.
- Capability inventory: The skill possesses the ability to execute shell commands via
Bash, write files to the filesystem usingccw cli, and spawn sub-agents through theTaskfunction. - Sanitization: Content extracted from project files is interpolated directly into subsequent prompts without any escaping, validation, or sanitization.
- [REMOTE_CODE_EXECUTION]: The skill dynamically assembles prompts for sub-agents that include executable shell script logic. In
phases/01-update-full.mdandphases/02-update-related.md, module paths and tool configurations are interpolated into a batch worker prompt template. This template containsBashcommands executed by thememory-bridgesub-agent, creating a risk of control flow manipulation if the input module list is tampered with.
Recommendations
- AI detected serious security threats
Audit Metadata