Memoria

WarnAudited by ClawScan on May 10, 2026.

Overview

Memoria looks like a real memory tool, but it tells agents to save broad personal details proactively and sync them to Notion automatically, so users should review its privacy behavior before installing.

Install only if you want an agent to maintain long-term memory. Before enabling it, decide what information should never be stored, consider disabling auto-sync, protect the vault directory, and use a limited Notion integration if you connect Notion.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private details shared in conversation could be saved permanently and later reused by the agent even if the user did not intend them to become memory.

Why it was flagged

The skill explicitly instructs the agent to persist broad personal and sensitive information without waiting for a user request, creating overbroad long-term memory and reuse risk.

Skill content
### What to capture (proactively, without being asked) ... Human shares personal info (name, location, health, settings) ... **If in doubt, store it.**
Recommendation

Only use this skill with clear user consent, define what must never be stored, and consider adding confirmation or redaction for sensitive categories such as health, location, credentials, and relationships.

What this means

Sensitive memories may be copied from the local vault into Notion without a separate review step for each item.

Why it was flagged

After Notion is configured, stored memories can be sent to an external provider automatically, which is risky when the same instructions encourage broad proactive memory capture.

Skill content
This enables **auto-sync**: every `memoria remember` and `memoria store` call will automatically push to Notion after saving locally. No separate sync step needed.
Recommendation

Keep auto-sync disabled unless needed, use a tightly scoped Notion integration/page, and review or filter memories before pushing them to Notion.

What this means

The agent may create, update, and sync memory records as part of normal operation even when the user did not specifically ask it to save or upload that information.

Why it was flagged

The skill directs routine autonomous command execution and syncing, rather than limiting storage and remote sync actions to explicit user requests.

Skill content
Run at the start and end of every session ... memoria wake ... memoria sleep ... memoria sync --push # always sync after storing
Recommendation

Require explicit confirmation for storing or syncing sensitive memories, and avoid blanket instructions such as always syncing after every store.

What this means

Anyone or any process with access to the vault config may be able to use the stored Notion integration token within its Notion permissions.

Why it was flagged

The Notion integration token is saved into the vault configuration and used for sync; this is purpose-aligned, but it is still a sensitive credential.

Skill content
config.notion = { token: options.token, rootPageId: options.page }; config.autoSync = true; await writeConfig(config);
Recommendation

Protect the vault directory, use a least-privileged Notion integration shared only with the intended page, and rotate the token if the vault may have been exposed.

What this means

Users may need to trust a globally installed npm package without registry-provided source provenance.

Why it was flagged

The skill documentation includes npm-based CLI installation, but the registry metadata does not provide a source/homepage or formal install spec, so package provenance is less clear.

Skill content
Source: unknown; Homepage: none; Install specifications: No install spec — this is an instruction-only skill.
Recommendation

Verify the npm package owner and source repository before global installation, and prefer pinned versions or reviewed source.