Scan Report
15 /100
memory-boost
Persistent task memory and keep-alive loop for OpenClaw agents. Every task gets durable notes. Arm the loop for long tasks, disarm when done. No external dependencies.
Memory Boost is a legitimate task-memory and keep-alive loop skill for OpenClaw. All behavior aligns with documentation; the install script performs standard file operations scoped to ~/.openclaw/. The pre-flagged 'rm -rf ~' is a documentation string in INSTALL.md's uninstall section, not executable code.
Safe to install
No blocking action needed. Consider adding an explicit allowed-tools declaration in SKILL.md frontmatter and narrowing the replayer prompt's 'one mechanical step' language to explicitly forbid shell invocation.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Low | Missing allowed-tools declaration | SKILL.md:1 |
| Low | Uninstall documentation uses destructive shell command | INSTALL.md:84 |
| Low | Broad 'one mechanical step' language in replayer | prompts/replayer-prompt.md:30 |
| Info | Cron jobs registered with OpenClaw | install.sh:109 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✓ Aligned | SKILL.md describes persistent file creation/editing under ~/.openclaw/memory/ |
| Shell | NONE | NONE | — | No shell execution declared or observed in prompts or scripts |
| Network | NONE | NONE | — | No network access declared or observed |
| Environment | NONE | NONE | — | No environment variable access declared or observed |
| Skill Invoke | NONE | NONE | — | No cross-skill invocation declared or observed |
| Clipboard | NONE | NONE | — | No clipboard access declared or observed |
| Browser | NONE | NONE | — | No browser access declared or observed |
| Database | NONE | NONE | — | No database access declared or observed |
1 Critical 2 findings
Critical Dangerous Command 危险 Shell 命令
rm -rf ~ INSTALL.md:84 Medium External URL 外部 URL
https://clawhub.ai/techieter/memory-keep-alive-for-obsidian README.md:98 File Tree
12 files · 27.5 KB · 819 lines Markdown 11f · 616L
Shell 1f · 203L
├─
▾
examples
│ └─
TASK-INDEX.md
Markdown
├─
▾
prompts
│ ├─
escalator-prompt.md
Markdown
│ ├─
replayer-prompt.md
Markdown
│ ├─
smoke-test-prompt.md
Markdown
│ ├─
validator-prompt.md
Markdown
│ └─
watchdog-prompt.md
Markdown
├─
▾
templates
│ ├─
LOOP-STATE.md
Markdown
│ └─
TEMPLATE.md
Markdown
├─
INSTALL.md
Markdown
├─
install.sh
Shell
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No credential harvesting — no access to ~/.ssh, ~/.aws, .env, or environment variables for exfiltration
✓ No external network requests — no curl, wget, or IP connections observed in any script or prompt
✓ No base64/encoded payloads — no obfuscation detected
✓ No eval() or dynamic code execution — all code is explicit and readable
✓ Scoped file operations — all prompts explicitly constrain reads/writes to ~/.openclaw/memory/
✓ Loop-gate architecture — watchdog, replayer, and escalator respect the armed/disarmed state
✓ install.sh uses 'set -euo pipefail' for safe bash execution
✓ Python fallback in install.sh reads/writes only to the designated jobs.json file
✓ File copy operations in install.sh use absolute paths derived from OPENCLAW_DIR, preventing path traversal