Trusted — Risk Score 5/100
Last scan:2 days ago Rescan
5 /100
openclaw-memory-fusion
Build and operate a unified OpenClaw memory system combining native Markdown memory, project memory, structured event memory, and upgrade-safe maintenance workflows
This is a legitimate OpenClaw memory management skill with no malicious behavior detected. It performs only local filesystem operations on designated workspace paths with no shell execution, network access, credential harvesting, or hidden functionality.
Skill Nameopenclaw-memory-fusion
Duration35.5s
Enginepi
Safe to install
This skill is safe to use. No security concerns identified.
ResourceDeclaredInferredStatusEvidence
Filesystem READ,WRITE READ,WRITE ✓ Aligned Path.read_text/write_text throughout scripts/openclaw_memory_fusion.py
Shell NONE NONE No subprocess, os.system, or shell execution found
Network NONE NONE No curl, wget, HTTP requests, or external connections
Environment READ READ ✓ Aligned Only reads OPENCLAW_WORKSPACE and OPENCLAW_CONFIG at lines 148-158

File Tree

11 files · 97.4 KB · 2524 lines
Python 1f · 2320L Markdown 10f · 204L
├─ 📁 scripts
│ └─ 🐍 openclaw_memory_fusion.py Python 2320L · 91.4 KB
├─ 📁 templates
│ ├─ 📝 ops_backlog.md Markdown 8L · 121 B
│ ├─ 📝 ops_history.md Markdown 8L · 121 B
│ ├─ 📝 ops_system_projects.md Markdown 7L · 87 B
│ ├─ 📝 project_aliases.md Markdown 8L · 278 B
│ ├─ 📝 project_artifacts.md Markdown 8L · 99 B
│ ├─ 📝 project_decisions.md Markdown 8L · 110 B
│ ├─ 📝 project_overview.md Markdown 16L · 216 B
│ ├─ 📝 project_timeline.md Markdown 8L · 108 B
│ └─ 📝 projects_index.md Markdown 12L · 160 B
└─ 📝 SKILL.md Markdown 121L · 4.7 KB

Security Positives

✓ Pure Python implementation with no shell commands or subprocess calls
✓ Scoped filesystem access to designated ~/.openclaw/workspace directory only
✓ Comprehensive safety defaults with dry-run mode for all mutating operations
✓ Mutation recording with manifests and checkpoints for rollback capability
✓ No network requests, external API calls, or remote code execution
✓ No credential harvesting or sensitive path access
✓ No obfuscation, encoding tricks, or hidden malicious functionality
✓ Template-based output using simple Markdown, no embedded scripts
✓ Clean codebase with no suspicious patterns (base64, eval, atob)