Memphis

ReviewAudited by ClawScan on May 10, 2026.

Overview

This documentation-only skill asks users to rely on an unprovided Memphis CLI for persistent memory, secrets, local indexing, and multi-agent sharing, so its high-impact behavior is not reviewable or clearly bounded.

Install only if you are comfortable treating this as documentation for an external, unreviewed Memphis CLI. Before using it, verify the actual CLI source, avoid storing real secrets, do not ingest broad private folders, and leave sharing/sync features disabled until data boundaries are clear.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may install what appears to be a complete tool, then be guided to run a command whose actual source and behavior are not supplied by this skill package.

Why it was flagged

The package claims a complete CLI-based system, but the registry artifact contains no implementation or install mechanism, so the behavior and provenance of the referenced `memphis` commands cannot be reviewed here.

Skill content
No install spec โ€” this is an instruction-only skill. No code files present โ€” this is an instruction-only skill.
Recommendation

Do not run `memphis` commands unless you independently verify where the CLI comes from, how it is installed, and what code it executes.

What this means

Private documents or inaccurate/untrusted content could become persistent agent context and influence later answers or decisions.

Why it was flagged

The skill advertises embedding and reusing local files in persistent memory, but does not define path limits, exclusions, retention, poisoning protections, or how stored context is reused across future tasks.

Skill content
memphis ingest ./papers --chain research --embed
memphis ask "What did paper X say?"
Recommendation

Only ingest narrowly selected, non-sensitive folders until the storage, deletion, exclusion, and retrieval behavior is clearly documented and verified.

What this means

Memories, decisions, or other local knowledge could be shared with other agents or networks without clear boundaries if the feature is used.

Why it was flagged

The artifacts describe syncing and collaboration with other agents over IPFS-like mechanisms, but do not specify identity checks, permissions, data boundaries, or what memory content may be shared.

Skill content
Share chain sync (IPFS)
- Multi-agent collaboration
- Agent negotiation (trade protocol)
Recommendation

Avoid multi-agent sync or sharing features unless you can verify exactly what data is shared, with whom, and how authorization is enforced.

What this means

Secrets may be placed under the control of an unreviewed local tool.

Why it was flagged

The vault feature is purpose-aligned, but it asks users to store and retrieve API keys or similar secrets while the actual vault implementation is not included in the reviewed artifacts.

Skill content
memphis vault add openai-key sk-xxx --password-env MEMPHIS_VAULT_PASSWORD
memphis vault get openai-key --password-env MEMPHIS_VAULT_PASSWORD
Recommendation

Use a separate trusted password manager or verify the Memphis vault code, encryption design, and file permissions before storing real credentials.

What this means

Users may over-trust the skill and store sensitive notes, documents, or credentials before verifying how the tool actually handles them.

Why it was flagged

The skill makes strong privacy claims while also advertising secret storage, document ingestion, and multi-agent/IPFS sharing, and the package contains no code to substantiate the privacy or security posture.

Skill content
vs. Cloud Solutions:
- โœ… 100% Private
- โœ… Offline first
- โœ… No cloud dependency
Recommendation

Treat the privacy claims as unverified marketing until the implementation, storage paths, network behavior, and sharing controls are independently reviewed.