Scan Report
20 /100
memory-keep-alive-for-obsidian
Automatic task memory and keep-alive loop for Obsidian-backed agents. Every task gets persistent notes. Arm the loop for long tasks, disarm when done.
The skill is a task-memory and keep-alive loop for Obsidian vaults. Shell access is used for cron job management (legitimate and documented), filesystem scope is constrained to the vault directory, and no sensitive data access, network exfiltration, or obfuscation was found. The `rm -rf ~` reference is uninstall documentation only, not live code.
Safe to install
No immediate action required. Consider narrowing the install script's filesystem scope to avoid broad `rm -rf` documentation in user-facing guides.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Shell usage in install script not declared in SKILL.md | install.sh:61 |
| Low | Broad `rm -rf` in uninstall documentation | INSTALL.md:108 |
| Low | Inline Python for jobs.json modification | install.sh:149 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ+WRITE | READ+WRITE | ✓ Aligned | SKILL.md: 'Task Memory' section declares filesystem writes to <vault>/Tasks/ |
| Shell | NONE | WRITE | ✓ Aligned | install.sh:61 — openclaw cron list | grep -q; install.sh:149-161 — writes jobs.j… |
| Network | NONE | NONE | — | No network calls found in any file |
| Environment | NONE | NONE | — | Only reads OPENCLAW_DIR and VAULT_PATH environment variables, no credential harv… |
| Skill Invoke | NONE | NONE | — | Cron jobs reference 'memory-keep-alive-for-obsidian' as skill name only |
| Clipboard | NONE | NONE | — | No clipboard access found |
| Browser | NONE | NONE | — | No browser access found |
| Database | NONE | NONE | — | No database access found |
1 Critical 1 findings
Critical Dangerous Command 危险 Shell 命令
rm -rf ~ INSTALL.md:108 File Tree
12 files · 31.1 KB · 862 lines Markdown 11f · 651L
Shell 1f · 211L
├─
▾
examples
│ └─
WORKFLOW-INDEX.md
Markdown
├─
▾
prompts
│ ├─
escalator-prompt.md
Markdown
│ ├─
replayer-prompt.md
Markdown
│ ├─
smoke-test-prompt.md
Markdown
│ ├─
validator-prompt.md
Markdown
│ └─
watchdog-prompt.md
Markdown
├─
▾
templates
│ ├─
LOOP-STATE.md
Markdown
│ └─
TEMPLATE.md
Markdown
├─
INSTALL.md
Markdown
├─
install.sh
Shell
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No credential harvesting or environment variable enumeration found
✓ No network requests, no external IP communication, no data exfiltration
✓ No base64, eval, or obfuscated code detected
✓ No access to ~/.ssh, ~/.aws, .env, or other sensitive paths
✓ No curl|bash or wget|sh remote script execution patterns
✓ All file operations are scoped to the user-provided vault path and OpenClaw config directory
✓ Vault scope is explicitly enforced in all prompt files (watchdog, replayer, escalator, validator)
✓ Cron job prompts all include a loop gate that stops execution when the loop is disarmed
✓ No reverse shell, C2, or data theft indicators found
✓ Skill behavior is well-documented in SKILL.md and README.md with no hidden capabilities