mem9-recall
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
curlutility within a Bash environment to perform HTTP GET requests to the memory service. This is the primary method for retrieving relevant historical data as described in the skill's purpose. - [DATA_EXFILTRATION]: User-provided search keywords and the
MEM9_TENANT_IDidentifier are transmitted to theapi.mem9.aiendpoint. These transmissions are directed to the vendor's official domain for the purpose of retrieving shared memories and do not represent unauthorized data exfiltration. - [PROMPT_INJECTION]: The skill processes content retrieved from an external service, which creates an indirect injection surface. 1. Ingestion points: Data enters the agent context from the
api.mem9.aimemories endpoint. 2. Boundary markers: The instructions lack explicit delimiters or specific warnings to ignore instructions that might be contained within the retrieved memory content. 3. Capability inventory: The skill has authorized access to theBashtool andcurlcommand. 4. Sanitization: There are no mentioned mechanisms for sanitizing or validating the memory content before the agent summarizes it.
Audit Metadata