agent-memory-ultimate

Fail

Audited by Socket on Mar 4, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
scripts/query.py

No indicators of network-based exfiltration, shell/backdoor, or credential harvesting in the provided file. The main issues are: (1) intentional insecure capability: cmd_sql allows arbitrary SQL execution from CLI and therefore full local DB read/write by any actor who can run the script; (2) pervasive programming errors where conn.execute is mis-invoked as a tuple, causing runtime failures and inconsistent behavior — this is a supply-chain integrity / code-quality concern. Treat this as low likelihood of deliberate malware but moderate security risk due to arbitrary-SQL capability and broken code that can hide intended functionality. Recommend code fixes and hardening before use in production.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 4, 2026, 01:27 AM
Package URL
pkg:socket/skills-sh/openclaw%2Fskills%2Fagent-memory-ultimate%2F@2940b709a972b1c364c776a6dc83777c5f6561ac