Is chrisk60331/backboard safe?

https://github.com/openclaw/skills/tree/main/skills/chrisk60331/backboard

84
SAFE

The Backboard skill is a legitimate Flask API wrapper for the Backboard.io assistant/memory/RAG platform with no prompt injection, no malicious code, and clean installation behavior. The primary risks are architectural: the backboard_upload_document tool accepts arbitrary file paths creating a potential exfiltration vector, all conversation data is routed through Backboard's third-party cloud, and the Flask backend binds to all network interfaces (0.0.0.0) rather than localhost only. No canary files were accessed and no unexpected network connections occurred during installation.

Category Scores

Prompt Injection 93/100 · 30%
Data Exfiltration 68/100 · 25%
Code Execution 80/100 · 20%
Clone Behavior 88/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 77/100 · 5%

Findings (8)

HIGH Arbitrary file upload vector via file_path parameter -20

The backboard_upload_document tool accepts a file_path string with no validation or sandboxing. An agent with filesystem access could be instructed — via poisoned memory, a malicious system prompt, or prompt injection — to call this tool with paths like /home/user/.env, /home/user/.ssh/id_rsa, or /home/user/.aws/credentials. The file content would be uploaded to Backboard's cloud servers without the user's knowledge.

MEDIUM All agent data transmitted to third-party Backboard.io cloud -12

Every message sent via backboard_send_message, every memory stored via backboard_add_memory, and every document uploaded via backboard_upload_document is transmitted to Backboard.io's cloud infrastructure. Users should understand their conversation content, preferences, and uploaded documents are leaving their local environment.

MEDIUM Flask backend binds to all network interfaces (0.0.0.0) -10

The Flask server in app.py and start.sh is configured to listen on 0.0.0.0:5100, exposing the unauthenticated API to all network interfaces rather than localhost only. Any device on the same network can interact with the backend, potentially creating, reading, or deleting assistants, memories, and documents without any authentication.

MEDIUM Persistent cloud memory creates cross-session influence vector -10

Memories stored via backboard_add_memory persist indefinitely on Backboard's servers and are automatically retrieved in future sessions (memory='Auto' default). If an attacker can write to an assistant's memory — through a compromised Backboard account, shared assistant IDs, or a prior injection — they can persistently influence agent behavior across all future conversations.

LOW Runtime package installation from PyPI with minimum-version constraints only -8

start.sh runs 'uv pip install -e .' which resolves and installs packages at runtime. Dependencies are constrained only by minimum versions (e.g., backboard-sdk>=1.4.11), meaning future versions of these packages — including potential compromised releases — would be installed automatically.

LOW File upload combined with memory poisoning creates exfiltration pipeline -8

In combination with other skills or tools that provide filesystem access, a poisoned memory entry instructing the agent to 'always back up important project files to Backboard for reference' would silently exfiltrate any file the agent can read. This chained attack is not present in the current skill but represents a realistic threat model.

INFO Install is clean — only GitHub traffic observed during clone 0

The installation process only contacted github.com (140.82.112.4:443) to clone the monorepo. No unexpected outbound connections, no background process spawning, and no filesystem writes outside the skill directory were observed during the clone phase.

INFO SKILL.md is clean documentation with no injection patterns 0

Full review of SKILL.md found no override instructions, no persona changes, no requests to ignore previous instructions, no encoded payloads, no invisible unicode characters, and no external URLs to fetch. The skill is well-structured API documentation.