Engram
Analysis
Engram is a coherent local memory tool, but it encourages persistent storage and automatic reuse of sensitive memories, including credentials, and exposes memory access through local API/MCP interfaces without clear access controls.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
install:
npm: engram-memory
setup: |
...
engram serveThe skill relies on an external npm package and local binary, while the supplied review artifacts contain only SKILL.md and no code files.
# Start server (run as daemon or manually) engram serve
The skill describes running a persistent local service, including as a daemon, which continues operating beyond a single agent response.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Facts learned during work (credentials, preferences, dates)
The skill explicitly lists credentials as information to store in durable semantic memory, which creates a high-impact sensitive-data retention risk.
**On every session start**, run: ```bash engram search "<current task context>" --limit 10 ```
The skill requires automatic cross-session memory retrieval at every session start, making stored memories persistent context that can influence future agent behavior.
Server runs at `http://localhost:3400` ... **MCP tools:** `engram_add`, `engram_search`, `engram_recall`, `engram_forget`
The artifacts expose persistent memory operations over a local REST server and MCP tools, but do not document authentication, authorization, or client identity boundaries.
