Omi Me

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its Omi.me integration purpose, but its API token handling has concrete safety issues that could expose or mishandle your Omi account token.

Install only if you are comfortable giving this skill access to your Omi.me memories, tasks, and conversations. Before use, fix or verify the API_URL/OMI_API_URL issue, restrict permissions on ~/.config/omi-me/token, avoid printing the token into chat or logs, and require explicit confirmation before update or delete commands.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your Omi API token could be sent to the wrong server if API_URL is set in the environment, or the CLI may fail in normal use because it does not use the documented OMI_API_URL value.

Why it was flagged

The script documents and defaults OMI_API_URL, but the authenticated curl request uses API_URL. API_URL is not declared in the skill metadata or setup instructions, so a generic environment variable could redirect bearer-token requests away from the intended Omi endpoint.

Skill content
export OMI_API_URL="${OMI_API_URL:-https://api.omi.me/v1/dev}" ... -H "Authorization: Bearer $OMI_API_TOKEN" ... "${API_URL}/$endpoint"
Recommendation

Change the request URL to use OMI_API_URL, declare any endpoint override explicitly, and validate that authenticated requests only go to the intended Omi.me API host by default.

What this means

Depending on the system umask, the saved token file may be readable by other local users or processes with access to your home directory.

Why it was flagged

The setup script can persist the API token from the environment to ~/.config/omi-me/token, but this branch does not apply chmod 600 after writing the secret.

Skill content
if [ -n "$OMI_API_TOKEN" ] && [ ! -f "$TOKEN_FILE" ]; then ... echo "$OMI_API_TOKEN" > "$TOKEN_FILE"
Recommendation

After writing the token file, set restrictive permissions such as chmod 600 on the token file and preferably chmod 700 on the config directory.

What this means

If the agent or user runs the wrong command, personal Omi data could be changed or deleted.

Why it was flagged

The skill exposes deletion and mutation operations for Omi memories, tasks, and conversations. This is disclosed and purpose-aligned, but it is high-impact account mutation capability.

Skill content
`omi memories delete <id>` ... `omi tasks delete <id>` ... `omi conversations delete <id>`
Recommendation

Use explicit user approval for update/delete actions, verify object IDs before destructive commands, and consider backups or recovery options before broad changes.

What this means

Running setup may change which `omi` or `omi-token` command is executed on the machine.

Why it was flagged

The user-run setup script installs command symlinks into /usr/local/bin when possible. This is a normal CLI setup pattern, but it changes a global PATH location and can overwrite existing symlinks with the same names.

Skill content
ln -sf "$SCRIPT_DIR/omi-cli.sh" /usr/local/bin/omi 2>/dev/null || true
Recommendation

Review the script before running it, avoid running it with unnecessary elevated privileges, and consider installing symlinks in a user-local bin directory instead.

What this means

Personal memories, tasks, and conversation data may be exposed to the agent session or changed through the integration.

Why it was flagged

The skill is designed to read and write persistent personal memory-like data from Omi.me. That is central to the purpose, but it means sensitive personal context can be retrieved, modified, or reused.

Skill content
sync and manage memories, action items (tasks), and conversations
Recommendation

Only connect an Omi account you intend the agent to access, review sensitive results before sharing them further, and be cautious about creating or syncing private memories.