cm
Fail
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The
AGENTS.mdfile includes a 'RULE 0' that acts as a behavioral override, instructing the agent to prioritize direct user commands over the established guidelines in the document ('I AM IN CHARGE, NOT YOU'), matching patterns used to bypass local constraints. - [REMOTE_CODE_EXECUTION]: Installation instructions in
README.mdandSKILL.mdutilizecurl | bashpatterns to execute scripts from the official Bun website (https://bun.sh/install) and the author's GitHub repository. While these are vendor-provided or well-known sources, the pattern remains a high-privilege execution vector. - [COMMAND_EXECUTION]: The skill's implementation in
src/cass.tsand various command modules utilizes shell command execution viaspawnSyncandexecFileto interact with the localcasssearch tool and execute commands on remote hosts viasshfor cross-agent memory sharing. - [DATA_EXFILTRATION]: Associated with its primary purpose of session reflection, the skill extracts content from local agent session logs and transmits it to external LLM provider APIs (Anthropic, OpenAI, Google) for analysis. While a sanitization layer in
src/sanitize.tsis implemented to redact common secrets (API keys, tokens, etc.), the processing of raw transcripts constitutes an inherent data privacy risk. - [PROMPT_INJECTION]: The system presents an indirect prompt injection surface as it ingests untrusted transcript data from
.jsonland.mdsession logs. These logs are processed by LLMs during the 'Reflector' and 'Validator' phases to derive new rules, which could allow instructions embedded in the transcripts to influence the generated playbook. - Ingestion points: Raw transcript data is ingested via
src/diary.tsandsrc/cass.ts(export function). - Boundary markers: Data is processed within structured JSON/Markdown formats, though the prompt templates in
src/llm.tsdo not show explicit delimiters designed to neutralize instruction-like text within the transcripts. - Capability inventory: The skill possesses the capability to write to the filesystem, execute shell commands, and perform network operations via
sshand LLM APIs. - Sanitization: A comprehensive sanitization module in
src/sanitize.tsautomatically redacts sensitive patterns (AWS keys, GitHub tokens, JWTs, etc.) before they are transmitted to external providers.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install, https://raw.githubusercontent.com/Dicklesworthstone/cass_memory_system/main/install.sh, https://raw.githubusercontent.com/${OWNER}/${REPO}/main/install.sh - DO NOT USE without thorough review
Audit Metadata