ℹ
Purpose & Capability
The skill claims a file-based memory framework and includes many markdown templates plus two shell scripts (search implementation and a compaction checker), which is coherent for the stated purpose. However documentation repeatedly references a bin/memory-search CLI and a bin/memory-search entrypoint (and recommends adding it to PATH), but the provided file manifest does not include a bin/memory-search executable — only lib/search.sh is present. That mismatch (docs expect an executable wrapper that isn't present) is unexplained and worth verifying.
!
Instruction Scope
SKILL.md runtime instructions are limited to copying templates into memory/ and updating the wake routine — reasonable. But other included docs instruct operations beyond simple file copying: (a) run `git pull origin main` inside the skill directory (network operation and remote code retrieval), (b) add token checks referencing an endpoint '/status' (no host specified), and (c) recommend adding CLI to PATH by editing shell rc files. The '/status' check is vague and could cause an agent to query an internal or external service without clear justification. These instructions grant discretion to run networked operations and to modify user shell config; that scope creep should be audited.
ℹ
Install Mechanism
There is no formal install spec (instruction-only), which reduces immediate installer risk. The package includes shell scripts (lib/search.sh and helpers/check-compaction.sh) that will be placed on disk if the user copies them. Documentation suggests cloning/pulling from GitHub and making scripts executable — benign for typical open-source tooling but introduces remote code pull risks if used without verification. No third-party binary downloads or extract-from-URL installs are declared.
✓
Credentials
The skill declares no required environment variables, no credentials, and no config paths. The requested filesystem access (copying templates into memory/, editing shell rc to add PATH) is proportionate to a file-based memory system. There are no explicit requests for secrets or unrelated credentials.
✓
Persistence & Privilege
Skill flags show always:false and default autonomy behavior; nothing requests forced always-on presence or modification of other skills' configs. The docs do instruct adding an entry to your wake routine and editing shell rc to add the CLI to PATH — normal for a local CLI tool but worth noting because it modifies user shell startup files.
What to consider before installing
What to check before installing or running this kit:
1) Verify the executable: the docs reference bin/memory-search but the manifest lacks that file. Inspect lib/search.sh and any bin wrapper expected by the docs. Do not run any 'memory-search' commands until you confirm which file is the CLI and that it is the intended code.
2) Inspect the scripts for network or remote-exec calls: open helpers/check-compaction.sh and lib/search.sh and grep for 'curl', 'wget', 'nc', 'ssh', 'scp', 'git', 'http', 'https', 'localhost', '127.0.0.1' or other external endpoints. The docs mention checking '/status' — find out what that refers to and whether the script will call an external service.
3) Avoid blindly running 'git pull' from an origin you don't control. If you clone from the public GitHub URL in README, verify the repository and its commit history first. Never run 'git pull' inside a skill directory from an unknown remote without review.
4) Backup your shell rc files before modifying PATH: the install docs recommend editing ~/.bashrc or ~/.zshrc. Save a copy and prefer adding an explicit alias or running the script via full path until you're confident.
5) Run locally in a sandbox first: test in an isolated environment (throwaway VM or container) to confirm behavior, especially compaction checks and any scripts that alter files or make network calls.
6) If you accept the kit, make the scripts executable yourself (chmod +x) and read them line-by-line. Look out for commands that write to locations outside the skill folder or that send data off-host.
If you want, I can (a) scan the contents of helpers/check-compaction.sh and lib/search.sh for suspicious calls and summarize any network or destructive operations, or (b) produce a safe step-by-step sandbox install checklist you can follow.