agent-v3-memory-specialist
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
post_executionhook contains a command injection vulnerability. It interpolates the$TASKvariable directly into a shell command:npx agentic-flow@alpha memory store-pattern ... --task "Memory Unification: $TASK". An attacker or a malicious sub-task could provide a value containing shell metacharacters (e.g.,;,`, or$()) to execute arbitrary code in the agent's environment. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill utilizes
npx agentic-flow@alphain bothpre_executionandpost_executionhooks. This command downloads and executes a package from the npm registry at runtime. The packageagentic-flowis not a trusted source, and the use of an@alphaversion increases the risk of supply-chain attacks. - [INDIRECT_PROMPT_INJECTION] (HIGH): The skill's architecture is designed to ingest and process untrusted external data.
- Ingestion points:
MarkdownBackendreads local files viafs.readFile, andUnifiedMemoryServiceprocessesMemoryEntrydata. - Boundary markers: There are no delimiters or instructions provided to the agent to ignore or isolate instructions embedded within the ingested data.
- Capability inventory: The skill possesses the ability to execute shell commands (via
npxhooks) and perform file/database operations. - Sanitization: No sanitization, validation, or escaping logic is implemented for content entering the unified memory system, allowing for potential manipulation of agent behavior.
- [INFO] (SAFE): The URLite scanner alert for
this.cais identified as a false positive. The string occurs as part of the internal code logicthis.calculateImprovement()and does not represent a malicious external domain.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata