Session Memory (Workspace)
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill is classified as suspicious due to the exposure of arguments in `SKILL.md` that allow the AI agent to specify arbitrary file paths for read and write operations. Specifically, `session-to-memory.js` accepts `--workspace /path/to/workspace` and `session-search.js` accepts `--sessions-dir /path`. While these arguments are plausibly needed for the skill's stated purpose, they introduce a significant vulnerability: if the AI agent is compromised via prompt injection, it could be coerced into reading from or writing to arbitrary file system locations, potentially leading to information disclosure or arbitrary file modification. The scripts themselves do not exhibit malicious intent (e.g., data exfiltration, backdoors, or direct malicious execution), and the `SKILL.md` does not contain explicit prompt injection instructions for the agent to perform harmful actions.
