Ori Mnemos

aayoawoyemi/Ori-MnemosApache-2.0โญ 66๐Ÿ”ง 16 tools

F1.9SpiderScore (registry)
โš  Hard constraint applied: critical vulnerability
Decision
Not Recommended
Confidence
90%

Ori Mnemos is not recommended โ€” low score (1.85/10) with 1 critical issues.

Recommended Actions

  • high
    Run In Container
    1 critical vulnerabilities require isolation
  • high
    Limit Permissions
    Restrict tool access to minimum required scope

Do Not

  • โœ—running in production without container isolation
  • โœ—using for security-sensitive tasks
Risk Flags (3)
  • critical
    child_process_injection
    Command injection รขโ‚ฌโ€ execSync() with non-literal command
  • high
    token_leakage
    Secret or token may be leaked through error messages, logs, or return values
  • high
    ts_path_traversalร—16
    Potential path traversal -- user input used in file system operations
How This Was Decided
  • negativew=0.5Overall quality score = 1.85/10 (grade F)
  • negativew=0.81 critical security issue(s) detected
  • negativew=0.517 high-severity issue(s) detected
  • negativew=0.3Tool description clarity score = 1.7/10
Source: SpiderRating automated security scanUpdated: 2026-03-21Protocol: v1.1

Description Quality

Composite: 1.7 / 10

3-Layer Breakdown

Description (38%)
1.7
Security (34%)
5.4
Metadata (28%)
7.0

Description Dimensions

Intent Clarity
1.5
Permission Scope
0.0
Side Effects
2.0
Capability Disclosure
3.7
Operational Boundaries
2.0

Security Analysis

5.4
Score
1
Critical
17
High
0
Medium
0
Low

Findings Redacted

Detailed security findings are hidden during the 90-day responsible disclosure window. Maintainers have been notified.

1 CRITICAL17 HIGH

Metadata Health

Provenance (40%)
7.0
Maintenance (35%)
8.0
Popularity (25%)
5.6

Badge

Add this badge to your README:

[![SpiderRating](https://spiderrating.com/badge/aayoawoyemi__Ori-Mnemos.svg)](https://spiderrating.com/servers/aayoawoyemi/Ori-Mnemos)