Context Anchor

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

The skill is designed to help an AI agent recover context by scanning its own memory and context files. The `SKILL.md` instructions are clear and align with this purpose, showing no signs of prompt injection for malicious intent. The `scripts/anchor.sh` uses standard Unix utilities (`cat`, `head`, `grep`, `sed`, `stat`, `date`) to read files exclusively from the agent's designated `memory/` and `context/active/` directories within its workspace. While the `WORKSPACE` variable can be overridden, the script's operations are read-only and confined to these specific subdirectories, preventing data exfiltration, malicious execution, or persistence outside its stated purpose.