manage-memory
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to performgrepoperations across the memory stores. If the search query provided by a user is not properly sanitized before being passed to the shell, it could be leveraged for command injection. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection by reading and displaying contents from markdown files to the agent context.
- Ingestion points: Files located in
.workflow/memory/and~/.claude/projects/{project}/memory/are accessed via theview,search, andlistsubcommands. - Boundary markers: Absent. The skill instructions do not specify the use of delimiters or warnings to the agent to disregard instructions found within the memory files.
- Capability inventory: The agent has access to
Bash,Write,Edit,Read,Glob, andGreptools, which could be abused if the agent is subverted by malicious content in a memory file. - Sanitization: Absent. The skill displays "full content" of files without validation or escaping of the stored text.
Audit Metadata