defragmenting-memory
Audited by Socket on Feb 24, 2026
1 alert found:
SecurityThis skill's stated purpose (decomposing and reorganizing local agent memory files) aligns with its file-system-heavy capabilities, but the required privileges are broad and potentially dangerous. The subagent is allowed to read, create, modify, and delete .md memory files in the agent's memfs directory and runs with full tool (Bash) access. Because memfs sync propagates these file changes to the remote API memory store, any sensitive content read or written by the subagent can be uploaded. The combination of background autonomous execution, write/delete permissions, and automatic sync to remote API constitutes a moderate-to-high supply-chain and data-exfiltration risk. Mitigations: require explicit interactive confirmations for deletions, restrict subagent tool access to a minimal sandbox, add explicit filtering/avoidance rules for credential-like content, and make the API endpoints and upload policy explicit. If those mitigations are not enforced, treat this skill as SUSPICIOUS and high-risk for accidental or intentional data leakage or destructive changes.