supermemory-cli
Pass
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The CLI enables the ingestion of external data from URLs, files, and third-party connectors (via
supermemory addandsupermemory connectors), which is then indexed for semantic search and profiling. This architecture presents a surface for indirect prompt injection if malicious instructions are embedded in the ingested sources. * Ingestion points:supermemory add(accepting text, files, and URLs) andsupermemory connectors(syncing from Google Drive, Notion, etc.) as seen in SKILL.md. * Boundary markers: The documentation does not specify the use of delimiters or 'ignore' instructions for ingested content. * Capability inventory: The CLI tool possesses capabilities for reading local files, making network requests to external URLs, and managing administrative resources like API keys and team roles. * Sanitization: No sanitization or validation routines for external content are mentioned in the documentation. - [COMMAND_EXECUTION]: The documentation includes commands for sensitive administrative tasks, such as creating and revoking API keys (
supermemory keys), managing team members and roles (supermemory team), and setting configuration values (supermemory config). - [EXTERNAL_DOWNLOADS]: The skill provides instructions for installing the official CLI tool from the
@supermemory/cliNPM package, which is a standard procedure from the tool's vendor.
Audit Metadata