Cross-Platform Memory Bridge
Analysis
The skill is transparent about its memory-bridging purpose, but it automatically places private Telegram, Discord, and local memory content into every agent request as system-level context.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
const messages = memoryContext
? [{ role: 'system' as const, content: memoryContext }, { role: 'user' as const, content: message }]The setup places retrieved memory content into a system-role message, which can make prior chat text or notes more authoritative than the current user request.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Reads recent user messages from Telegram and Discord session logs and injects them into the agent's memory context on every gateway request.
The skill intentionally reuses recent cross-platform conversation logs as agent memory on every request, creating a persistent context channel that can be poisoned by prior messages.
When the agent receives a message (via any channel), this bridge reads: 1. Telegram messages ... 2. Discord messages ... 3. Local memory files
The artifacts describe cross-channel data reuse for any incoming channel, but do not define participant, channel, consent, or disclosure boundaries.
