Agent Memory Local

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The skill bundle implements a local-first memory retrieval system but contains high-risk behaviors. Specifically, `retrieve.py` includes functionality to exfiltrate memory snippets to an external endpoint (`https://api.siliconflow.cn/v1/rerank`) for reranking, which could expose sensitive workspace data if an API key is configured. Furthermore, several scripts (`agent_memory_local.py`, `memory_query.py`, and `explain.py`) use `subprocess` to execute Python commands with arguments derived from user-supplied queries, creating a potential surface for argument injection or unauthorized command execution. While these features are documented as part of the retrieval logic, the combination of external network calls and shell-adjacent execution of untrusted input meets the threshold for a suspicious classification.