OpenClaw Memory Resilience

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only memory skill is coherent, but it encourages silent durable memory writes, searchable long-term logs, and credential-related content in agent memory, so users should review it before applying it globally.

Use this skill only if you want persistent agent memory and understand that saved notes may survive across sessions. Before applying it globally, remove or rewrite any guidance that would store raw credentials, add rules for what the agent may save, review memory files periodically, and prefer per-workspace or per-agent rollout.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private details, mistakes, or stale instructions could be saved and later reused without the user seeing exactly what was written.

Why it was flagged

This describes automatic, non-visible memory writes at compaction time; without review or exclusions, sensitive or incorrect conversation context can be persisted.

Skill content
OpenClaw injects a silent turn that prompts the agent to save important context to disk. The user never sees this turn. The `NO_REPLY` token in the prompt suppresses delivery.
Recommendation

Add explicit allow/deny rules for what may be saved, review memory files regularly, and avoid silent auto-flush in sensitive workspaces unless users accept that behavior.

What this means

Information from old conversations may remain searchable long after the original session, including information the user did not intend to preserve.

Why it was flagged

The skill proposes durable, append-only session logs that remain searchable after archival, but it does not specify deletion, retention, or sensitive-data filtering controls.

Skill content
`memory/YYYY-MM-DD.md` — raw session logs. Append-only. The pre-compaction flush writes here. Archive after ~2 weeks. ... Archived files remain fully searchable via `memory_search`
Recommendation

Define retention and deletion policies, exclude secrets and sensitive personal data, and index only approved memory paths.

What this means

If users store raw secrets or access details there, the agent may read and reuse them in every session, increasing exposure and misuse risk.

Why it was flagged

The documentation recommends placing credential-related information in persistent agent-accessible files, but does not limit this to non-secret references or describe secret-management safeguards.

Skill content
TOOLS.md — Environment: SSH hosts, services, credentials map ... MEMORY.md — curated, compact, durable facts. Credentials, infrastructure, decisions, preferences.
Recommendation

Do not store raw credentials in memory files; store only references to a secret manager, keep file permissions tight, and separate sensitive access details from general agent memory.

What this means

All agents in the workspace may start saving memory, adding footers, or resetting based on thresholds, which may surprise users if applied wholesale.

Why it was flagged

A single recommended configuration can affect all agents and future responses, including per-response status calls and automatic reset behavior; this is disclosed and purpose-aligned, but broad.

Skill content
Apply via `gateway config.patch`. This is a global default — applies to all agents ... Add to every agent's SOUL.md ... **Every response:** fetch live status via `session_status` ... Auto-clear: **85% context** OR **6 compactions**
Recommendation

Apply the configuration per-agent or in a test workspace first, and require confirmation before reset or clear actions if disruption matters.