Shared Memory between Lobsters

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its shared-memory purpose, but it includes credential-handling patterns that could expose or silently reuse an Ensue API key.

Install only if you intend this skill to manage Ensue shared-memory access. Before use, verify which Ensue API key it will use, do not let troubleshooting commands reveal the raw key, and require confirmation for grants, deletes, org-wide permissions, or broad namespace patterns.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your Ensue API key could be displayed in terminal output or conversation context during troubleshooting.

Why it was flagged

The troubleshooting instructions tell the agent/user to print or grep locations that may contain the API key. If the command output is captured in the chat or logs, the credential could be exposed.

Skill content
echo $ENSUE_API_KEY
grep -A2 'ensue-learning-memory' ~/.clawdbot/clawdbot.json
Recommendation

Check only whether a key exists, or mask/redact the value before showing command output. Avoid pasting API keys into chat or logs.

What this means

The skill may operate with an Ensue account credential you configured elsewhere.

Why it was flagged

If ENSUE_API_KEY is not set, the script looks for Ensue credentials in local Claude plugin cache files and later in ~/.clawdbot/clawdbot.json. This is related to the stated provider, but it means the skill may use an existing local credential rather than only a key explicitly supplied for this skill.

Skill content
key_file="$HOME/.claude/plugins/cache/ensue-learning-memory/ensue-learning-memory/0.2.0/.ensue-key"
if [ -f "$key_file" ]; then
    cat "$key_file"
Recommendation

Confirm which Ensue API key is being used and revoke or rotate keys that should not be available to this skill.

What this means

A mistaken grant could share or allow changes to more memory than intended.

Why it was flagged

The skill exposes permission-management commands that can grant broad read/write/delete access to memory namespaces. This matches the skill purpose, but it is high-impact authority.

Skill content
`grant org <action> <pattern>` ... **Actions**: `read`, `create`, `update`, `delete`
Recommendation

Use the narrowest namespace pattern possible, avoid org-wide grants unless necessary, and require explicit user confirmation before permission changes or deletions.

What this means

Other users may be able to read or influence shared memory that agents rely on later.

Why it was flagged

The skill is designed to share persistent memory and subscribe to memory changes. Shared persistent memory can affect future agent context if permissions are too broad or if untrusted users can write to shared namespaces.

Skill content
Share memories and state with other users ... `subscribe <key>` | Get notified on changes
Recommendation

Share only intended namespaces, separate private/shared/public memory carefully, and review active permissions and subscriptions.