Memory Networks

v1.0.0

基于 Memory Networks 论文的记忆推理系统,让记忆能够参与推理过程

0· 137·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (Memory Networks, memory-based reasoning) match the SKILL.md content: architecture, single-/multi-hop inference, memory types, and example usage. There are no unexpected credential or binary requirements that don't belong to a local ML/QA component.
Instruction Scope
SKILL.md is a design/instruction document with code snippets showing how to store/query memories and a sample local memory path (E:\QClaw\memory\). It does not instruct the agent to read arbitrary system files, access unrelated env vars, or transmit data externally. Note: the examples imply persistent local storage of memories (file paths) — an actual implementation could read/write disk, so users should review any runtime implementation before allowing it to persist sensitive data.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be written to disk or downloaded by the skill itself during installation.
Credentials
The skill declares no required environment variables, credentials, or config paths. The SKILL.md examples reference a local path only as an example; there is no request for unrelated secrets or cloud credentials.
Persistence & Privilege
always is false and model invocation is allowed (default). This is standard for skills that may be invoked autonomously; there is no request to modify other skills or system-wide settings.
Assessment
This is an instruction-only skill describing how to implement a Memory Network; it doesn't request credentials or install additional software. Before using it in a running agent, consider: (1) the SKILL.md contains sample code that assumes persistent storage — if you or an implementation persist memories to disk, avoid storing sensitive data or credentials there; (2) if someone provides a runnable implementation of this design, review any file I/O or network calls in that implementation before granting it permissions; (3) the SKILL.md includes a personal contact (WeChat) — that's informational only but not related to function. Overall the skill appears coherent with its stated purpose, but always inspect any concrete code that implements these instructions before running it in a privileged environment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97axr1vwcpmpst1heym1e1hm1836j3s

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔗 Clawdis

Comments