supermemory-cli

Fail

Audited by Snyk on Mar 19, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt shows and encourages passing API keys directly in CLI arguments and exporting env vars with literal key values (e.g., supermemory login --api-key sm_abc_xxx, export SUPERMEMORY_API_KEY=sm_abc_xxx), which would require the agent to accept and reproduce secrets verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly ingests arbitrary external content (e.g., "supermemory add https://...", piping curl output into "supermemory add --stdin", and the "connectors connect" flows for Google Drive/Notion) which is untrusted user/third‑party data that the agent will read/extract into memories and influence searches/profiles, enabling indirect prompt injection.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 19, 2026, 06:33 AM
Issues
2