projectmanagement
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
inmemoriasub-skill frequently executesnpx in-memoria, which downloads and runs code from an unverified third-party NPM package (in-memoriaby userpi22by7) at runtime. - [EXTERNAL_DOWNLOADS]: The
jirasub-skill relies on themcportertool andatlassianMCP server, which are downloaded and executed from external sources without being part of an established trusted vendor list. - [PROMPT_INJECTION]: Instructions in
miniproject/SKILL.mdemploy psychological manipulation, stating the agent 'will be rewarded' for high-quality codebase mapping, a technique used to influence AI behavior outside of standard parameters. - [COMMAND_EXECUTION]: Multiple shell scripts (
miniproject.sh,wiki,get_ticket_summary.sh) execute complex command chains involvinggit,awk,sed, andfindusing inputs derived from the local environment and project files, which may be susceptible to argument injection. - [COMMAND_EXECUTION]: The skill hardcodes an absolute path to the author's local home directory (
/home/zenobius/) inminiproject/SKILL.mdandminiproject.sh, which can lead to command failures or execution of incorrect scripts on other systems. - [DATA_EXFILTRATION]: The
in-memoriacomponent is designed to 'learn' and index the entire codebase (npx in-memoria learn ./src), creating a risk of exposing architectural patterns and sensitive logic to a third-party tool with unverified telemetry behavior.
Audit Metadata