hippocampus-memory

Pass

Audited by Gen Agent Trust Hub on Feb 23, 2026

Risk Level: SAFEPROMPT_INJECTION
Full Analysis
  • PROMPT_INJECTION (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8).
  • Ingestion points: scripts/preprocess.sh reads raw conversation transcripts from ~/.openclaw/agents/$AGENT_ID/sessions/*.jsonl which contain untrusted user input.
  • Boundary markers: Absent. In scripts/summarize-pending.sh, signals are passed to the sub-agent for summarization using simple numeric labels (e.g., [1], [2]) without unique random delimiters or XML-style tags to prevent the LLM from confusing signal content with instructions.
  • Capability inventory: The sub-agent (via summarize-pending.sh and agents/hippocampus-agent.md) has the capability to write to the memory/index.json file and potentially manipulate the agent's long-term memory state.
  • Sanitization: scripts/preprocess.sh performs regex-based cleaning, removing control characters, specific tags (like <file>), and non-ASCII sequences, which provides some mitigation against simple injection attempts.
  • COMMAND_EXECUTION (SAFE): The skill executes multiple local Bash and Python scripts to manage its memory lifecycle.
  • Evidence: install.sh correctly uses chmod +x on its own scripts and initializes data files using heredocs with quoted delimiters (e.g., 'EOF') to prevent shell injection during installation.
  • DATA_EXFILTRATION (SAFE): While the skill processes sensitive conversation history, it does so entirely within the local $WORKSPACE. No network operations or unauthorized data transmissions were detected in the provided scripts.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 23, 2026, 08:14 AM