Scan Report
22 /100
tiered-recall
分层回忆系统 - 解决上下文长度限制,保持项目延续性
A legitimate memory management skill with one suspicious artifact: a hardcoded Windows System32 path in check_index.py that never executes, combined with absent allowed-tools declarations in SKILL.md.
Safe to install
Review check_index.py before production use; add explicit allowed-tools declarations to SKILL.md; remove hardcoded absolute paths.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Medium | Hardcoded Windows System32 path targeting privileged user directory | scripts/check_index.py:3 |
| Low | No allowed-tools section in SKILL.md | SKILL.md:1 |
| Low | Unrestricted workspace argument allows arbitrary directory access | scripts/build-index.py, scripts/load.py:174 |
| Info | shutil.rmtree used for index cleanup (with user confirmation flag) | scripts/build-index.py:171 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ | ✓ Aligned | SKILL.md: no allowed-tools section; build-index.py and load.py read memory/ and … |
| Filesystem | NONE | WRITE | ✓ Aligned | build-index.py: writes index.json and projects.json to output_dir; load.py: read… |
| Shell | NONE | NONE | — | No subprocess, os.system, or shell invocation found. |
| Network | NONE | NONE | — | No network requests of any kind in any script. |
3 findings
Medium External URL 外部 URL
https://img.shields.io/badge/ClawHub-tiered--recall-blue README.md:5 Medium External URL 外部 URL
https://clawhub.com/skill/tiered-recall README.md:5 Medium External URL 外部 URL
https://img.shields.io/badge/version-1.0.0-green README.md:6 File Tree
6 files · 36.7 KB · 1251 lines Python 3f · 617L
Markdown 2f · 592L
JSON 1f · 42L
├─
▾
scripts
│ ├─
build-index.py
Python
│ ├─
check_index.py
Python
│ └─
load.py
Python
├─
config.json
⚠
JSON
├─
README.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ No network requests of any kind — fully offline operation
✓ No credential harvesting or environment variable enumeration
✓ No remote script execution (no curl|bash, wget|sh, or eval patterns)
✓ No base64-encoded payloads or obfuscated code
✓ No access to sensitive paths like ~/.ssh, ~/.aws, or .env
✓ No subprocess or shell invocation — all operations are pure Python pathlib/json
✓ Script code is readable and straightforward, with no hidden functionality
✓ No external dependencies beyond the Python standard library