jsonl-digest
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill attempts to execute an external Python script located at
~/Downloads/Codebase/playground/claude-memory-ops/extract_ai_text.py. Since this script is an external dependency not bundled with the skill, its contents cannot be verified, posing a risk of arbitrary code execution. - [COMMAND_EXECUTION]: The skill uses shell commands like
findandpython3to locate and process conversation logs across the user's home directory. It also usestouchto manage a state marker file at~/.claude/.last-jsonl-extraction. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes untrusted conversation logs (
.jsonlfiles). Instructions or malicious patterns embedded in past conversations could influence the agent's behavior during the extraction process. - Ingestion points: Files matching
*.jsonlwithin$HOME/.claude/projects. - Boundary markers: None identified. The skill directly processes the output of the extraction tool.
- Capability inventory: Subprocess execution (
python3,find), filesystem write access (creating.mdfiles in memory directories), and state management (touch). - Sanitization: The skill includes natural language instructions to avoid recording credentials or keys, but lacks technical sanitization or escaping of the ingested data.
- [DATA_EXFILTRATION]: The skill systematically reads sensitive conversation history and project metadata from the
.claudedirectory. While it does not demonstrate immediate network exfiltration, it concentrates this sensitive information into temporary files in/tmp/and writes derived knowledge back to the memory system.
Audit Metadata