Memory Compress
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill contains a path traversal vulnerability in `scripts/memory-compress.js` because it uses `path.resolve(WORKSPACE, DAILY_LOG)` and `path.resolve(OUTPUT)` without validating that the resulting paths remain within the intended workspace. This allows the script to read from or write to arbitrary locations on the filesystem if the input arguments are manipulated. While the code lacks evidence of intentional malice, such as network exfiltration or obfuscation, the insecure file handling is a high-risk flaw.
