Code Memory

kapillamba4/code-memoryMIT26🔧 4 tools

F2.0SpiderScore (registry)
⚠ Hard constraint applied: critical vulnerability
Decision
Not Recommended
Confidence
90%

Code Memory is not recommended — low score (2.0/10) with 2 critical issues.

Recommended Actions

  • high
    Run In Container
    2 critical vulnerabilities require isolation
  • high
    Limit Permissions
    Restrict tool access to minimum required scope

Do Not

  • running in production without container isolation
  • using for security-sensitive tasks
Risk Flags (2)
  • critical
    sql_injection×2
    SQL injection — .execute() called with f-string (user input may reach query)
  • high
    unsafe_path_resolution
    File operation on user-controlled path without validation or sandboxing
How This Was Decided
  • negativew=0.5Overall quality score = 2.0/10 (grade F)
  • negativew=0.82 critical security issue(s) detected
  • negativew=0.51 high-severity issue(s) detected
  • negativew=0.3Tool description clarity score = 3.4/10
Source: SpiderRating automated security scanUpdated: 2026-03-22Protocol: v1.1

Description Quality

Composite: 3.4 / 10

3-Layer Breakdown

Description (38%)
3.4
Security (34%)
6.5
Metadata (28%)
6.3

Description Dimensions

Intent Clarity
6.0
Permission Scope
0.0
Side Effects
2.0
Capability Disclosure
5.5
Operational Boundaries
4.8

Security Analysis

6.5
Score
2
Critical
1
High
0
Medium
5
Low

Findings Redacted

Detailed security findings are hidden during the 90-day responsible disclosure window. Maintainers have been notified.

2 CRITICAL1 HIGH

Metadata Health

Provenance (40%)
7.0
Maintenance (35%)
7.0
Popularity (25%)
4.0

Badge

Add this badge to your README:

[![SpiderRating](https://spiderrating.com/badge/kapillamba4__code-memory.svg)](https://spiderrating.com/servers/kapillamba4/code-memory)