ai-brain
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
read-memory.shscript is vulnerable to path traversal. It accepts absolute paths starting with/or relative paths using../without sanitization, allowing the agent to read sensitive files anywhere on the system (e.g.,~/.ssh/id_rsa,/etc/passwd).\n- [COMMAND_EXECUTION]: Thewrite-memory.shandappend-history.shscripts are vulnerable to path traversal when creating or updating memory files. By providing a crafted name (e.g.,../../../.bashrc), an attacker could overwrite critical system configuration files, potentially leading to arbitrary command execution when the user opens a new terminal.\n- [PROMPT_INJECTION]: The skill facilitates indirect prompt injection by design. It automatically saves 'learned' user preferences and AI lessons into identity files (AI.md,you.md) which are explicitly loaded into the agent's context at the start of every session. Malicious instructions provided in one conversation can thus be 'remembered' and executed in subsequent sessions. Evidence:session.shloads these files at start, whilewrite-memory.shupdates them based on session observations without sanitization or boundary markers.\n- [COMMAND_EXECUTION]: Therecall.shscript usesgrepon user-controlled file content. While less severe than the path traversal issues, unsanitized keyword inputs could potentially be used to influencegrepbehavior via command-line flags.
Recommendations
- AI detected serious security threats
Audit Metadata