扫描报告
5 /100
openclaw-memory-fusion
Build and operate a unified OpenClaw memory system combining native Markdown memory, project memory, structured event memory, and upgrade-safe maintenance workflows
This is a legitimate OpenClaw memory management skill with no malicious behavior detected. It performs only local filesystem operations on designated workspace paths with no shell execution, network access, credential harvesting, or hidden functionality.
可以安装
This skill is safe to use. No security concerns identified.
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | READ,WRITE | READ,WRITE | ✓ 一致 | Path.read_text/write_text throughout scripts/openclaw_memory_fusion.py |
| 命令执行 | NONE | NONE | — | No subprocess, os.system, or shell execution found |
| 网络访问 | NONE | NONE | — | No curl, wget, HTTP requests, or external connections |
| 环境变量 | READ | READ | ✓ 一致 | Only reads OPENCLAW_WORKSPACE and OPENCLAW_CONFIG at lines 148-158 |
目录结构
11 文件 · 97.4 KB · 2524 行 Python 1f · 2320L
Markdown 10f · 204L
├─
▾
scripts
│ └─
openclaw_memory_fusion.py
Python
├─
▾
templates
│ ├─
ops_backlog.md
Markdown
│ ├─
ops_history.md
Markdown
│ ├─
ops_system_projects.md
Markdown
│ ├─
project_aliases.md
Markdown
│ ├─
project_artifacts.md
Markdown
│ ├─
project_decisions.md
Markdown
│ ├─
project_overview.md
Markdown
│ ├─
project_timeline.md
Markdown
│ └─
projects_index.md
Markdown
└─
SKILL.md
Markdown
安全亮点
✓ Pure Python implementation with no shell commands or subprocess calls
✓ Scoped filesystem access to designated ~/.openclaw/workspace directory only
✓ Comprehensive safety defaults with dry-run mode for all mutating operations
✓ Mutation recording with manifests and checkpoints for rollback capability
✓ No network requests, external API calls, or remote code execution
✓ No credential harvesting or sensitive path access
✓ No obfuscation, encoding tricks, or hidden malicious functionality
✓ Template-based output using simple Markdown, no embedded scripts
✓ Clean codebase with no suspicious patterns (base64, eval, atob)