notion-agent-memory
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
The skill is classified as suspicious due to several high-risk capabilities and potential vulnerabilities. Specifically, the `SKILL.md`, `assets/MEMORY-TEMPLATE.md`, `references/act-framework.md`, and `references/notion-integration.md` files instruct the agent to store a Notion API key in `~/.config/notion/api_key` and then use shell commands like `$(cat ~/.config/notion/api_key)` or `$(grep ... | cut ...)` within `curl` calls. This pattern is vulnerable to shell injection if the content of the API key file can be controlled by an attacker. Additionally, the `assets/HEARTBEAT-TEMPLATE.md` file contains an instruction for the agent to 'Use cron jobs for background tasks', which, if interpreted as a direct command, could lead to unauthorized persistence on the system. While these actions are presented within the context of the skill's stated purpose (Notion integration and agent memory management), they represent significant security risks and vulnerabilities rather than clear malicious intent.
