amem-discord

Warn

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes multiple external CLI tools, specifically amem and acomm (configured for Discord integration).
  • [COMMAND_EXECUTION]: Uses the shell source command on ~/.config/yuiclaw/.env. This pattern is used to load environment variables but effectively executes the contents of the file, posing a risk if the configuration file is compromised.
  • [COMMAND_EXECUTION]: Includes instructions to execute binaries using cargo run from a specific, hardcoded absolute directory path: /home/yuiseki/Workspaces/repos/amem.
  • [DATA_EXFILTRATION]: Accesses a sensitive file path (~/.config/yuiclaw/.env) which is expected to contain authentication credentials or environment secrets, and subsequently transmits data to external Discord servers via the notification tools.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 14, 2026, 04:20 PM