memory-fabric
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its architecture of retrieving and processing stored memories.
- Ingestion points: Data enters the agent's context through the
mcp__memory__search_nodestool which queries a knowledge graph. - Boundary markers: Absent. The skill does not implement delimiters or specific instructions to treat graph-retrieved text as untrusted data.
- Capability inventory: The skill has access to the
Bashtool, file reading viaRead, and full manipulation of the memory graph. - Sanitization: Absent. The extraction and normalization logic described in
references/entity-extraction.mdandreferences/query-merging.mdperforms no filtering or sanitization of input text to prevent instruction injection. - [COMMAND_EXECUTION]: The skill utilizes the
Bashtool and references shell scripts (prompt/memory-fabric-context.sh,stop/memory-fabric-sync.sh) for session lifecycle management. While standard for orchestration, the combination of shell access with the processing of untrusted memory data increases the potential impact of an injection attack. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
@anthropic/memory-mcp-servervianpx. This is an official package from Anthropic, a well-known and trusted organization.
Audit Metadata