triple-memory
Warn
Audited by Socket on Mar 1, 2026
1 alert found:
AnomalyAnomalySKILL.md
LOWAnomalyLOW
SKILL.md
The memory-system specification describes a coherent, multi-backend approach with plausible integration points and standard embedding-based persistence. Key security considerations are typical for such setups: secret management for API keys, verified provenance for third-party tooling, and transparent auditing for silent memory operations. There is no evident malware or data-exfiltration pattern; however, the dependency surface and data retention aspects warrant governance controls and verifiable provenance before production use.
Confidence: 65%Severity: 50%
Audit Metadata