Scan Report
5 /100
openclaw-memory-fusion
Build and operate a unified OpenClaw memory system combining native Markdown memory, project memory, structured event memory, and upgrade-safe maintenance workflows
This is a legitimate OpenClaw memory management skill with no malicious behavior detected. It performs only local filesystem operations on designated workspace paths with no shell execution, network access, credential harvesting, or hidden functionality.
Safe to install
This skill is safe to use. No security concerns identified.
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ,WRITE | READ,WRITE | ✓ Aligned | Path.read_text/write_text throughout scripts/openclaw_memory_fusion.py |
| Shell | NONE | NONE | — | No subprocess, os.system, or shell execution found |
| Network | NONE | NONE | — | No curl, wget, HTTP requests, or external connections |
| Environment | READ | READ | ✓ Aligned | Only reads OPENCLAW_WORKSPACE and OPENCLAW_CONFIG at lines 148-158 |
File Tree
11 files · 97.4 KB · 2524 lines Python 1f · 2320L
Markdown 10f · 204L
├─
▾
scripts
│ └─
openclaw_memory_fusion.py
Python
├─
▾
templates
│ ├─
ops_backlog.md
Markdown
│ ├─
ops_history.md
Markdown
│ ├─
ops_system_projects.md
Markdown
│ ├─
project_aliases.md
Markdown
│ ├─
project_artifacts.md
Markdown
│ ├─
project_decisions.md
Markdown
│ ├─
project_overview.md
Markdown
│ ├─
project_timeline.md
Markdown
│ └─
projects_index.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ Pure Python implementation with no shell commands or subprocess calls
✓ Scoped filesystem access to designated ~/.openclaw/workspace directory only
✓ Comprehensive safety defaults with dry-run mode for all mutating operations
✓ Mutation recording with manifests and checkpoints for rollback capability
✓ No network requests, external API calls, or remote code execution
✓ No credential harvesting or sensitive path access
✓ No obfuscation, encoding tricks, or hidden malicious functionality
✓ Template-based output using simple Markdown, no embedded scripts
✓ Clean codebase with no suspicious patterns (base64, eval, atob)