Is dcprevere/org-memory safe?
https://github.com/openclaw/skills/tree/main/skills/dcprevere/org-memory
org-memory is a legitimate org-mode knowledge management and task tracking skill with a clean installation profile: no executable code, no data exfiltration instructions, no canary file tampering, and network activity limited to the expected GitHub clone. The primary security concern is the explicit no-confirmation shortcut design ('Remember:' and 'Note:' patterns fire immediately), which removes the agent's default caution gate and creates a prompt injection persistence vector when this skill is combined with skills that process external content. The skill also depends on an external 'org' CLI binary that was not evaluated in this audit and represents an unverified supply chain dependency.
Category Scores
Findings (7)
MEDIUM No-confirmation shortcut execution bypasses agent caution gate -25 ▶
The SKILL.md explicitly instructs the agent 'Don't ask for confirmation on shortcuts — just do it' for the 'Remember:' and 'Note:' trigger patterns. While each write produces a visible 'org-memory:
LOW Unvetted external binary dependency (org CLI) -8 ▶
The skill requires the 'org' CLI binary installed separately from a third-party GitHub repository (github.com/dcprevere/org-cli). This binary is not part of the skill package and was not evaluated in this audit. A compromised build, a supply chain attack on the releases page, or a malicious fork could cause the binary to read sensitive files, exfiltrate data over the network, or execute arbitrary code while appearing to perform normal org-file operations. Users should independently vet the org-cli binary before installation.
LOW Skill combination risk: web/document access skills enable prompt injection persistence -20 ▶
When org-memory is installed alongside skills that fetch web content, process emails, or read documents, the no-confirmation shortcut pattern creates a complete prompt injection attack chain. An attacker who controls a webpage, document, or email the agent reads can embed 'Remember: [instruction]' payloads that will be automatically written into the agent's org-roam knowledge graph and recalled in all future sessions. This is a cross-skill attack surface that does not require compromising org-memory itself.
LOW Atomic batch operations could apply sweeping changes to human task files -12 ▶
The batch operations feature executes multiple mutations against in-memory state and writes only if all succeed. While this is a sound transactional design, it means a single injected batch command could atomically mark tasks done, add tags, reschedule items, and append notes across the human's org files in one operation with no per-step confirmation. The blast radius of a single malicious batch invocation is limited only by the number of commands in the JSON payload.
LOW Search commands operate across entire configured org directories -15 ▶
The 'org search' and 'org agenda' commands scan all files within the configured ORG_MEMORY_HUMAN_DIR and ORG_MEMORY_AGENT_DIR without path restriction. If users store sensitive information in org format (passwords in drawers, API keys in notes, confidential meeting notes) within these directories, that content will be surfaced to the agent and included in its context window, where it could be leaked via other skills or included in model outputs.
INFO Expected network activity during installation 0 ▶
The install process connected exclusively to GitHub (140.82.121.4:443) to perform the sparse git clone of the openclaw/skills monorepo. Ubuntu motd-news traffic to 185.125.188.54 is a pre-existing background system service unrelated to the skill. No connections to unexpected or attacker-controlled endpoints were observed during install.
INFO Canary file read accesses are audit-framework artifacts, not skill behavior 0 ▶
Filesystem monitoring shows read-only opens of .env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, and .config/gcloud/application_default_credentials.json. Cross-referencing auditd timestamps confirms these accesses occurred at 1771927869 (pre-install, audit framework canary setup) and 1771927893 (post-install, audit framework integrity verification). All file opens carried CLOSE_NOWRITE flags. The skill itself contains no instructions to access these paths.