可信 — 风险评分 5/100
上次扫描:1 天前 重新扫描
5 /100
mem9
Persistent cloud memory for OpenClaw with cross-session recall, explicit remember/save flows, shared spaces, hybrid search, and a visual dashboard
A legitimate cloud memory plugin skill with comprehensive documentation, clear scope, and no security concerns identified.
技能名称mem9
分析耗时25.0s
引擎pi
可以安装
No action needed. This skill is safe to use.

安全发现 1 项

严重性 安全发现 位置
提示
Implementation limited to documentation 文档欺骗
This skill consists entirely of markdown documentation files. There are no executable scripts or code files to analyze for hidden functionality. All described behavior is clearly documented.
All markdown files with no scripts/
→ For complete security assurance, the actual @mem9/mem9 npm package should be reviewed separately.
SKILL.md:1
资源类型声明权限推断权限状态证据
命令执行 WRITE WRITE ✓ 一致 openclaw plugins install/uninstall commands in SETUP.md and UNINSTALL.md
文件系统 WRITE WRITE ✓ 一致 Edits openclaw.json with specific scoped keys in SETUP.md
网络访问 READ READ ✓ 一致 Connects to https://api.mem9.ai (declared in SKILL.md)
环境变量 NONE NONE No environment variable access observed
技能调用 NONE NONE No nested skill invocations
8 项发现
🔗
中危 外部 URL 外部 URL
https://api.mem9.ai
SETUP.md:152
🔗
中危 外部 URL 外部 URL
https://mem9.ai/your-memory/
SETUP.md:336
🔗
中危 外部 URL 外部 URL
https://mem9.ai/openclaw-memory
SKILL.md:4
🔗
中危 外部 URL 外部 URL
https://mem9.ai/
SKILL.md:29
🔗
中危 外部 URL 外部 URL
https://mem9.ai/SKILL.md
SKILL.md:184
🔗
中危 外部 URL 外部 URL
https://mem9.ai/UNINSTALL.md
SKILL.md:184
🔗
中危 外部 URL 外部 URL
https://mem9.ai/TROUBLESHOOTING.md
SKILL.md:194
🔗
中危 外部 URL 外部 URL
https://registry.npmmirror.com
TROUBLESHOOTING.md:145

目录结构

4 文件 · 46.4 KB · 977 行
Markdown 4f · 977L
├─ 📝 SETUP.md Markdown 417L · 18.5 KB
├─ 📝 SKILL.md Markdown 215L · 11.4 KB
├─ 📝 TROUBLESHOOTING.md Markdown 159L · 8.7 KB
└─ 📝 UNINSTALL.md Markdown 186L · 7.9 KB

安全亮点

✓ Comprehensive and well-structured documentation with clear safety rules
✓ Declared network scope limited to api.mem9.ai only
✓ Config changes strictly scoped to specific openclaw.json keys
✓ User-provided credentials handled locally without exfiltration
✓ Explicit approval gates before any destructive operations
✓ No credential harvesting patterns observed
✓ No obfuscation or suspicious encoding patterns
✓ No remote code execution patterns (curl|bash, wget|sh)
✓ Clear uninstall process with local cleanup
✓ Restart flow explicitly disclosed to user