memory-forensics
Warn
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill requires elevated privileges via sudo for essential forensic operations. This includes loading kernel modules with insmod for memory extraction and direct access to raw system memory via /dev/mem using dd.
- [CREDENTIALS_UNSAFE]: Provides capabilities for extracting highly sensitive authentication data from memory images. Plugins such as windows.hashdump, windows.lsadump, and windows.cachedump allow for the retrieval of password hashes and LSA secrets.
- [EXTERNAL_DOWNLOADS]: Directs users to install the Volatility 3 framework via pip and download OS symbol tables from the Volatility Foundation website. These are identified as trusted and well-known resources within the security research community.
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it extracts and displays potentially malicious strings and command lines from untrusted memory dumps. Ingestion points: Memory dump files (e.g., memory.raw, memory.lime, memory.elf). Boundary markers: None used to separate extracted data from agent instructions. Capability inventory: The agent has access to Bash, Write, and Edit tools which could be leveraged if the agent obeys instructions found in the memory data. Sanitization: No content validation or filtering is performed on strings extracted from the memory images.
Audit Metadata