NTM Memory System
v1.0.0基于 Neural Turing Machines 的外部记忆系统,让 AI 具备可读写的外部记忆能力
⭐ 0· 99·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (NTM external memory) matches the SKILL.md: the file contains architecture explanation, addressing/read-write algorithms, and example integration code. There are no unrelated requirements (no cloud keys, no unrelated binaries).
Instruction Scope
SKILL.md contains algorithm descriptions and example code snippets (TypeScript/Python/JS) for implementing/using an NTM memory system. It does not instruct the agent to read arbitrary files, access environment variables, call external endpoints, or exfiltrate data.
Install Mechanism
No install spec and no code files — instruction-only. Nothing will be downloaded or written by the skill itself, minimizing install-time risk.
Credentials
The skill declares no required environment variables, credentials, or config paths. The content does not reference secrets or external service credentials.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent system privileges or modify other skills' configurations.
Assessment
This skill is a self-contained instructional description of a Neural Turing Machine memory system (no code is shipped and nothing is installed). It does not request credentials or access. Before using in a running agent:
- Remember this is documentation and example code, not an executed module; if you or your team copy the examples into runnable code, review them for correctness and resource use (e.g., large memory matrices).
- The listed contact is a personal WeChat number in metadata — treat it as external contact info and avoid sharing private data with unknown third parties.
- Because the skill is from an unknown source, if you plan to implement or run contributed code based on these instructions, have a developer review it for safety and performance.
Overall: coherent and low-risk, but exercise normal caution before executing any code derived from it.Like a lobster shell, security has layers — review code before you run it.
latestvk97dfpqn6emaqb4de3qgfbhc39836am5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
