neo4j-agent-memory
Pass
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references installing the
neo4j-agent-memorypackage from the official PyPI registry and usinguvxto execute vendor-provided tools. These resources are hosted on well-known services and are consistent with standard development practices. - [COMMAND_EXECUTION]: Documentation includes instructions for
pip install,uvx, and registration commands for MCP servers likeclaude mcp add. These are intended for environment setup and tool configuration, posing no security risk in the context of this reference material. - [PROMPT_INJECTION]: The skill describes a memory system that ingests external user data, creating a potential surface for indirect prompt injection where untrusted content could influence agent context.
- Ingestion points: Data enters the system through
MemoryClient.short_term.add_messageand thememory_store_messagetool. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are documented in the provided reference snippets.
- Capability inventory: Tools such as
memory_searchandmemory_get_contextretrieve the ingested data to build LLM prompts. - Sanitization: The documentation does not specify sanitization or validation logic for the content stored in the graph memory.
Audit Metadata