Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
muninn
v2.3.7Universal Context Protocol (CXP) for AI agents. v2.3.7 includes the latest high-performance CXP engine (compiled 2026-02-13) with fix for memory amnesia, macOS binary support, and pfeilschnell indexing. Created by @Blackknight1dev.
⭐ 2· 2.4k·1 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name/description (local CXP memory layer) matches the code and npm install of muninn-core (Node). However the SKILL.md and README claim a bundled Rust CXP engine (compiled 2026-02-13), while the code expects a native binary in a ../bin path; the provided skill files do not include that binary. That gap is notable but plausibly explained if the npm package includes it at publish time.
Instruction Scope
Runtime instructions and code enforce a 'Brain-First' protocol and the middleware will automatically intercept many tool calls (filesystem, git, execute_command, etc.) and inject context. The package also writes/updates project files (.muninn contents, .gitignore) and appends a managed 'MUNINN PROJECT BRAIN ENFORCEMENT' block into files like CLAUDE.md, .cursorrules, and .antigravityrules. Automatic modification of repository files and silent injection into many tool responses is consistent with the stated purpose but is scope-creep from a simple 'memory' helper and may be surprising or undesirable to users.
Install Mechanism
Install uses npm (muninn-core) which is a standard mechanism. This is moderate risk but expected for a Node skill. The provided package files/manifest show typical deps. The notable point: SKILL.md references a compiled Rust-based CXP engine; the skill's JS code expects a native binary under ../bin (cxp, cxp-linux, cxp-arm64, etc.). The package contents in this submission do not show that binary, so the runtime may fail or npm may deliver it separately—verify the actual npm release contents before installing.
Credentials
The skill declares no required environment variables or external credentials, and the code does not require cloud keys. A test script and some optional behaviors reference MUNINN_PROJECT_PATH / MUNINN_AUTO_DETECT, but these are not required. No unrelated credentials are requested.
Persistence & Privilege
The skill runs persistent filesystem watchers (chokidar) and writes files under the project (.muninn/), updates .gitignore, and appends managed rule blocks to project files (CLAUDE.md, .cursorrules, .antigravityrules). While this is consistent with a local memory system, it is elevated privilege relative to a read-only context helper and could surprise users or pollute repositories. always:false (no global always-on flag) reduces systemic risk, but the skill still makes persistent, project-local changes.
What to consider before installing
Things to check before installing or enabling Muninn:
- Verify the npm package contents: confirm that the published muninn-core package actually includes the native 'cxp' binary (for your platform) or documents how to obtain it. If the binary is missing, CXP operations will fail.
- Inspect and approve repository modifications: Muninn will create/modify .muninn/, append enforcement blocks to files like CLAUDE.md, .cursorrules, .antigravityrules, and update .gitignore. If you don't want automated edits to project files, do not install or run in production repos.
- Review the code that auto-injects context: middleware silently enriches many tool calls (filesystem, git, command execution). Make sure you are comfortable with automatic context injection into tools and responses.
- Test in an isolated environment first: run Muninn in a disposable repo or VM to observe behavior (indexing, watcher, file writes) and confirm no unexpected network activity.
- Audit the native binary if present: if the package includes a precompiled Rust binary, verify its provenance (publisher, checksums, or GitHub release) before executing native code.
- If you need stricter control, require explicit user-invocation for context operations or run with limited permissions and avoid projects with sensitive files until you're confident in behavior.
Why 'suspicious' (medium confidence): most behaviors align with a local memory engine, but the missing/assumed native binary and the automatic, persistent modifications to repo files plus wide interception of tool calls are design choices that can be misused or surprising. Additional information (actual npm release contents, presence of the cxp binary, or upstream repository with release tags and checksums) would raise confidence to 'high' and likely move this to 'benign'.Like a lobster shell, security has layers — review code before you run it.
latestvk973v9bahb0rn0f46mcew57x39812dce
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🐦⬛ Clawdis
Binsnode
Install
Install Muninn Core
Bins: muninn-core
npm i -g muninn-core