Memory Setup (Jack)
v1.0.0Enable and configure Moltbot/Clawdbot memory search for persistent context. Use when setting up memory, fixing "goldfish brain," or helping users configure m...
⭐ 0· 134·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the instructions: the SKILL.md explains enabling memorySearch, creating MEMORY.md and memory/ folders, and configuring embedding providers—all coherent with a memory-setup utility.
Instruction Scope
Instructions focus on editing the agent config (~/.clawdbot/clawdbot.json or moltbot.json), creating workspace files, and restarting the agent gateway. They do not instruct reading or exfiltrating unrelated system files or contacting unexpected endpoints.
Install Mechanism
No install spec or code files are present; this is instruction-only so nothing is downloaded or written by the skill itself.
Credentials
The skill metadata declares no required env vars, but the doc mentions VOYAGE_API_KEY and OPENAI_API_KEY as provider-specific requirements (in troubleshooting). This is proportionate for embedding providers, but the metadata could explicitly list them as optional to avoid confusion.
Persistence & Privilege
Skill is not force-included (always:false) and does not request persistent system-wide privileges; it instructs the user to modify their agent's own config files and to restart the gateway, which is expected for this task.
Assessment
This skill is a how-to for enabling and configuring your agent's memory and appears internally consistent. Before applying: back up your existing ~/.clawdbot/moltbot config, review any memory files you create for sensitive data (they will be indexed), and prefer the local provider if you don't want to supply external API keys. Note the doc mentions VOYAGE_API_KEY and OPENAI_API_KEY for external embedding providers—only provide those keys if you trust the provider and understand where embeddings/requests are sent.Like a lobster shell, security has layers — review code before you run it.
latestvk97452rc2z19pvn3826ypz42y183awar
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
