knowledge-management
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [DYNAMIC_EXECUTION]: The
generateIndexfunction inindex-local.jsuses the unsafeeval()function to parse thetagsarray from markdown frontmatter. Because this data is extracted from source memory files (MEMORY.mdand daily logs) that are parsed as text, an attacker can inject arbitrary JavaScript by including a specially crafted tags array in those files. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted content from local memory files which serves as an entry point for potential code execution.
- Ingestion points:
MEMORY.mdand daily files in thememory/directory are parsed by theMemoryParserclass. - Boundary markers: No explicit delimiters or boundary markers are used to separate user-provided content from control metadata during parsing.
- Capability inventory: The skill possesses extensive file system capabilities (read, write, and delete via
fs.unlinkSyncin the cleanup tool) and the ability to execute dynamic code viaeval(). - Sanitization: While basic character replacement is used for filenames (
sanitizeFilename), no validation or sanitization is performed on metadata fields parsed from file content before being passed toeval().
Recommendations
- AI detected serious security threats
Audit Metadata