Memoclaw Skill

ReviewAudited by ClawScan on May 10, 2026.

Overview

This memory skill appears coherent and not malicious, but it should be reviewed because it uses a wallet private key/payment-capable external CLI and remote persistent memory that are not fully reflected in the registry metadata.

Install only if you trust MemoClaw and its npm CLI. Use a dedicated low-balance wallet, approve paid and destructive commands manually, avoid storing secrets or sensitive personal data, and periodically review/export/delete memories that should not persist.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a funded wallet is configured, agent or CLI use can spend USDC after the free tier, and the private key must be protected like a financial credential.

Why it was flagged

The skill needs a wallet private key or wallet-backed configuration and can authorize paid calls, while the registry metadata declares no required env vars and no primary credential. That under-declares a high-impact credential/payment boundary.

Skill content
This skill requires MEMOCLAW_PRIVATE_KEY environment variable for wallet auth. Use a dedicated wallet. ... After that, USDC on Base required.
Recommendation

Use only a dedicated low-balance wallet, require explicit approval before paid commands, and update the skill metadata to declare the wallet/private-key credential and payment behavior.

What this means

Installing the external CLI gives that package local code execution and access to the configured MemoClaw wallet credentials.

Why it was flagged

The skill relies on an external, globally installed npm CLI whose implementation is not included in the reviewed artifacts. This is central to the skill, but users must trust that package because it will handle wallet setup and API calls.

Skill content
npm install -g memoclaw
memoclaw init                    # one-time wallet setup
Recommendation

Install the CLI only from a trusted source, consider pinning/reviewing the package version, and avoid running CLI upgrades automatically.

What this means

A mistaken or automated destructive command could delete stored memories or move them into the wrong namespace.

Why it was flagged

The documented CLI can perform destructive memory-management actions such as purging a namespace. The example recommends backing up first, so this appears purpose-aligned, but it should not be run without user intent.

Skill content
memoclaw export --format json --namespace old-project --output backup-old-project.json
memoclaw purge --namespace old-project --force
Recommendation

Prefer dry-run and backup commands before purge/move/delete operations, and require user confirmation for force or yes flags.

What this means

Personal facts, project details, or poisoned/inaccurate memories could be stored remotely and reused in later sessions.

Why it was flagged

The skill can ingest conversation or document text into a persistent remote memory store for later semantic recall. This is the stated purpose, but it means sensitive or incorrect content may persist and influence future agent context.

Skill content
cat conversation.txt | memoclaw ingest --namespace default --auto-relate
Recommendation

Do not ingest secrets or sensitive files by default, use namespaces and retention controls, review stored memories periodically, and treat recalled memories as context to verify rather than unquestioned truth.