para-second-brain

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOW
Full Analysis
  1. SKILL.md: This file primarily contains detailed instructions and explanations for the agent and user. It outlines the PARA structure, memory flush protocols, and content templates. It instructs the user to run mkdir -p and ln -s commands. The ln -s command creates a symbolic link, which is a local file system operation. While symbolic links can be misused, in this context, it's a user-instructed setup step to make the 'notes' directory searchable by the agent, not an agent-executed command with arbitrary paths. No prompt injection patterns, data exfiltration, obfuscation, privilege escalation, or persistence mechanisms were detected. References to other skills on clawdhub.com and GitHub repositories are informational and do not constitute unverifiable dependencies for this skill.
  2. _meta.json, manifest.json, skill.json: These are standard metadata files and contain no executable code or malicious patterns.
  3. scripts/setup.sh: This is a shell script designed to scaffold the PARA directory structure. It uses standard commands like mkdir -p, cat, and date to create directories and populate initial MEMORY.md and daily log files within the specified workspace. The script operates safely within the designated WORKSPACE and does not perform any external network requests, sensitive file access, privilege escalation, or install unverified dependencies. All command execution is benign and serves the stated purpose of setting up the knowledge base.
  4. templates/concept.md, templates/pattern.md, templates/tool.md: These are markdown templates for structured note-taking. They contain no executable code or malicious content.

Adversarial Reasoning: No hidden or obfuscated malicious code was found. The skill's stated purpose aligns perfectly with its implementation. The setup.sh script is straightforward and performs only benign file system operations. The ln -s command is a user-executed instruction, not an agent-executed one, and is for a legitimate purpose. The general risk of indirect prompt injection for memory-based skills is noted, but this skill does not introduce specific vulnerabilities beyond this inherent risk.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 08:09 AM