amem-discord
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple external CLI tools, specifically
amemandacomm(configured for Discord integration). - [COMMAND_EXECUTION]: Uses the shell
sourcecommand on~/.config/yuiclaw/.env. This pattern is used to load environment variables but effectively executes the contents of the file, posing a risk if the configuration file is compromised. - [COMMAND_EXECUTION]: Includes instructions to execute binaries using
cargo runfrom a specific, hardcoded absolute directory path:/home/yuiseki/Workspaces/repos/amem. - [DATA_EXFILTRATION]: Accesses a sensitive file path (
~/.config/yuiclaw/.env) which is expected to contain authentication credentials or environment secrets, and subsequently transmits data to external Discord servers via the notification tools.
Audit Metadata