Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Openclaw Deeprecall

v0.1.2

Provides persistent two-tier memory with semantic fact search and raw content retrieval, plus automatic cleanup of temporary session files.

0· 320·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Functionality (L1/L2 memory, summarization, cleanup) matches the name and description. However, the skill's metadata declares no required credentials while the summarizer explicitly requires an LLM API provider (baseUrl + apiKey) from OpenClaw configuration files; that credential requirement is documented in SKILL.md but not reflected in declared requirements, causing a mismatch.
!
Instruction Scope
SKILL.md instructs auto-registering tools and zero-config behavior which is consistent with the purpose. But the runtime code searches for OpenClaw config files in multiple locations (including /etc and parent directories) and will read those files to obtain API keys. The instructions and code therefore grant the skill access to local/system configuration and potentially other agents' workspaces, which is broader than a simple 'memory retrieval' operation and may expose unrelated secrets.
Install Mechanism
No network downloads or package installs are performed by an install spec (instruction-only install). The bundle includes Python scripts and a requirements.txt (aiohttp) but no installer that pulls remote artifacts; this is low-risk from an installation/execution provenance perspective.
!
Credentials
The manifest declares no required environment variables or primary credential, yet the code reads OPENCLAW_WORKSPACE and scans for openclaw.json files to retrieve provider baseUrl and apiKey. That means local/system stored API keys (in ~/.openclaw, /etc/openclaw/, workspace parent, etc.) may be read and used — a credential access pattern not reflected in the skill metadata. Also the DB permanently stores raw content (L2) by default, which increases the sensitivity of stored data.
!
Persistence & Privilege
The skill creates and writes a persistent memory.db (auto-created in discovered memory/ locations) and documents that L1/L2 records are permanent and never deleted. While always:false and no elevated platform flags are present, the permanent storage of raw content (and auto-registration/zero-config behavior) increases long-term data exposure and cross-agent leakage risk, especially because the code auto-detects parent/agents directories.
What to consider before installing
This skill appears to implement a legitimate two-tier memory and summarization system, but there are notable privacy and configuration mismatches you should consider before installing: - Credential access: The summarizer reads OpenClaw configuration files (e.g., ~/.openclaw/openclaw.json, /etc/openclaw/openclaw.json, workspace/openclaw.json) to obtain LLM provider baseUrl and apiKey. Even though the manifest does not declare required credentials, the code will try to read and use those API keys. If those files contain secrets you don't want shared with this skill, do not install or run it until you review or remove those keys. - Permanent storage: By default the tool stores raw session content in the L2 archive (memory.db) and the SKILL explicitly states those records are permanent and never deleted. If you have sensitive data in session .md files, disable raw storing (use --no-store-raw where possible), or ensure the DB is stored in an isolated location you control, or encrypt/remove L2 storage. - Cross-workspace access: Path detection searches parent directories and 'agents' structures and may find configs or memory directories belonging to other agents. Run this skill in an isolated workspace (or set OPENCLAW_WORKSPACE to a dedicated directory) and test with dry-run options first. - Test safely first: Use summarize --test-config and cleanup --dry-run to observe behavior. Consider setting deeprecall.summarizer.preferred_provider to a local/test provider or null to trigger rule-based extraction, and use --no-store-raw while testing. - Desired changes: Prefer that the skill explicitly declare it requires OpenClaw provider credentials (or require OPENCLAW_API_KEY env), and provide an option to disable L2 archiving permanently. If you cannot confirm those changes, treat installation as potentially exposing local OpenClaw credentials and persistent raw data.

Like a lobster shell, security has layers — review code before you run it.

latestvk974hp83mdga5bhyeqk8kypfah82t6s9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments