Engrm Memory
v0.1.0Use Engrm memory deliberately before coding, during coding, and when saving reusable lessons.
⭐ 0· 117·0 current·0 all-time
by@dr12hes
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the instructions: the skill guides use of an external memory system (Engrm). It requests no unrelated binaries, env vars, or config paths — nothing appears extraneous for this purpose.
Instruction Scope
SKILL.md confines itself to recommending when to read or save memory and explicitly forbids inventing Engrm CLI commands or fake setup steps. It does not instruct reading arbitrary files, exfiltrating data, or calling unexpected endpoints. It relies on Engrm being available but does not describe any out-of-scope data collection.
Install Mechanism
No install spec or code files — instruction-only skill, so nothing is written to disk or downloaded.
Credentials
No environment variables, credentials, or config paths are requested. This is proportional for a guidance-only skill that delegates actual memory access to existing infrastructure.
Persistence & Privilege
always is false and the skill does not request elevated or permanent platform privileges. Normal autonomous invocation is allowed (platform default) but the skill itself does not expand privilege.
Assessment
This skill is a set of usage rules for an external memory service (Engrm) and is internally consistent. Before installing or using it, confirm that you actually have a trusted Engrm integration available in your environment (the skill assumes an existing connection and forbids inventing access methods). Consider privacy implications of saving project memories — ensure saved items don't contain secrets or proprietary data, and verify which agent or service will perform the actual memory reads/writes. If your environment lacks Engrm, the skill advises to continue without attempting to fabricate access.Like a lobster shell, security has layers — review code before you run it.
latestvk972xp5m6fn970e5eftppr4h7983465amemoryvk972xp5m6fn970e5eftppr4h7983465aopenclawvk972xp5m6fn970e5eftppr4h7983465ashared-memoryvk972xp5m6fn970e5eftppr4h7983465a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
