pact-memory

Warn

Audited by Gen Agent Trust Hub on Mar 12, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The scripts/memory_init.py module automatically downloads Python packages (pysqlite3, sqlite-vec, model2vec) from the Python Package Index (PyPI) if they are missing from the environment.\n- [REMOTE_CODE_EXECUTION]: Automated package installation via pip involves downloading and executing installation scripts, representing a remote code execution surface. The skill also dynamically loads SQLite extensions and imports modules at runtime.\n- [COMMAND_EXECUTION]: The skill uses subprocess.run to execute external binaries: pip for dependency installation in scripts/memory_init.py, vm_stat for memory monitoring on macOS in scripts/embedding_catchup.py, and git for project root discovery in scripts/memory_api.py and scripts/working_memory.py.\n- [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface. Ingestion points: Data passed to the save and update commands in scripts/memory_api.py. Boundary markers: None; content is formatted as plain markdown in CLAUDE.md. Capability inventory: Subprocess execution (git, pip, vm_stat) and file system write access (CLAUDE.md). Sanitization: None; input fields are interpolated directly into markdown templates without validation or escaping.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 12, 2026, 05:54 PM