agent-memory-mcp
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires cloning a repository from an unverified external source:
https://github.com/webzler/agentMemory.git. - [REMOTE_CODE_EXECUTION]: The skill executes code from the downloaded repository via
npm installandnpm run, allowing arbitrary scripts to run on the host system. - [COMMAND_EXECUTION]: The skill instructions involve running shell commands that interact with the local filesystem and workspace paths.
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection by storing and retrieving untrusted data in its memory bank. Ingestion points:
memory_writetool. Boundary markers: None specified. Capability inventory:memory_read,memory_write, andmemory_searchtools. Sanitization: Not documented.
Recommendations
- AI detected serious security threats
Audit Metadata