MemoryLayer
v1.0.0Semantic memory for AI agents. 95% token savings with vector search.
⭐ 7· 1.9k·10 current·10 all-time
by@khli01
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name, description, code, and examples all consistently implement a remote semantic-memory client that talks to https://memorylayer.clawbot.hk. Requiring an API key or email/password is expected for this purpose. However, the published registry metadata lists no required environment variables or primary credential even though both the SKILL.md and the code expect MEMORYLAYER_API_KEY or MEMORYLAYER_EMAIL/MEMORYLAYER_PASSWORD — this mismatch is a packaging/documentation inconsistency.
Instruction Scope
Runtime instructions and SKILL.md confine the agent to authenticating and calling the remote MemoryLayer API (store/search/get_context/stats). Example scripts read or simulate reading local MEMORY.md to demonstrate token savings, which is relevant to the feature; nothing in the SKILL.md tells the agent to scan unrelated system files or exfiltrate other credentials.
Install Mechanism
There is no remote download/install step in the skill bundle (instruction-only + included wrapper code). Included Node and Python wrappers use standard HTTP libraries (axios/requests) and no obfuscated or external install URL is used. Dependencies are standard and appear from npm/PyPI; package-lock and requirements are present. Risk from install mechanism is low.
Credentials
The code and SKILL.md require credentials (MEMORYLAYER_API_KEY or MEMORYLAYER_EMAIL/ MEMLAYER_PASSWORD), which are appropriate for a hosted memory service. The concern is the registry metadata declares no required env variables or primary credential — a mismatch that could mislead users into not providing needed secrets correctly or failing to realize where secrets are used. Also note the skill will send any stored memory content to the remote domain; do not store sensitive secrets or PII in memories unless you trust the service and its policy.
Persistence & Privilege
Flags show default invocation rules (always:false, autonomous invocation allowed). The skill does not request persistent system privileges, modify other skills, or create system-wide config. It keeps auth tokens only in the process memory (singleton instance) and does not write them to disk.
What to consider before installing
This skill is a straightforward client for a remote MemoryLayer service and mostly does what it says, but there are a few things to check before installing:
- Credential mismatch: The package registry metadata says no env vars are required, but both SKILL.md and the code expect either MEMORYLAYER_API_KEY or MEMORYLAYER_EMAIL and MEMORYLAYER_PASSWORD. Confirm which credentials are required and where they'll be stored.
- Remote data flow: Using the skill will send stored memories (the content you pass to remember()) to https://memorylayer.clawbot.hk. Do not send secrets, private keys, or highly sensitive personal data unless you have reviewed the service's privacy/security policy and trust the operator.
- Prefer API key: Use an API key with least privilege over an account email/password where possible. Avoid putting credentials in source files; use environment variables or secret management.
- Verify publisher and code: The repo URL and homepage are present — inspect the upstream GitHub repo, check commit history, and verify the domain TLS cert and privacy policies. If you need higher assurance, run the package in an isolated environment first or prefer the advertised self-hosted Enterprise option.
- Ask for clarification: If you plan to install this into a production or highly-privileged agent, ask the publisher to correct the registry metadata to declare required env vars and to provide an audited package release.
Given the metadata inconsistency but otherwise coherent behavior, treat the skill as potentially useful but verify credentials handling and trust of the remote service before use.Like a lobster shell, security has layers — review code before you run it.
latestvk9759x1c23nan6z10pe1s6fenn80hhbv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
