smart-memory
Fail
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The README and installation scripts (e.g.,
install.sh) promote a high-risk pattern where a remote shell script is downloaded from an untrusted GitHub account (BluePointDigital) and piped directly to bash. This allows for the execution of unverified and potentially malicious code on the host system during setup. - [COMMAND_EXECUTION]: The
memory.jsandsmart_memory.jsfiles utilizeexecSyncandchild_processto manage memory indexing and searching operations. While the skill attempts to wrap arguments withJSON.stringifyto mitigate injection, the programmatic execution of shell commands based on runtime input remains a significant attack surface. - [EXTERNAL_DOWNLOADS]: The skill performs several external downloads, including fetching the
all-MiniLM-L6-v2embedding model (approximately 80MB) from HuggingFace viaTransformers.js. It also attempts to dynamically load thesqlite-vecextension from various local and system-defined paths, which could be exploited if an attacker can write files to those locations. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its core function of ingesting and synthesizing external data.
- Ingestion points: Processes user queries through
memory_searchand reads data fromMEMORY.mdand various files within thememory/directory. - Boundary markers: There are no explicit delimiters or instruction-bypass warnings used when retrieved content is interpolated into the agent's context during 'Focus Mode' synthesis.
- Capability inventory: The skill possesses extensive capabilities, including shell command execution (
execSync) and local file system access (read/write). - Sanitization: The codebase implements path traversal defenses using
path.resolveand workspace prefix validation inmemory.js, and it sanitizes FTS5 search queries to prevent SQL-related issues.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/BluePointDigital/smart-memory/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata