Memory Pipeline
v0.1.0Install, repair, and validate a persistent memory workflow for OpenClaw-style agents using Markdown memory files plus recurring cron jobs. Use when setting u...
⭐ 0· 95·0 current·0 all-time
byLilyanne@maiusless
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the contents: SKILL.md, reference docs, and two helper scripts all focus on creating/validating Markdown memory files and checking cron jobs for an OpenClaw-style workspace. Nothing requested (no env vars, no external installs) is out of scope for the stated purpose.
Instruction Scope
Instructions are narrowly scoped to creating/verifying memory files and installing three cron jobs; they do ask the operator/agent to 'install' cron jobs but do not include automated install steps. The verification script checks cron payloads and workspace references. This is expected but note that actually creating cron jobs requires scheduler/CLI access (e.g., an 'openclaw' CLI or other tooling) which is external to the skill.
Install Mechanism
No install spec (instruction-only) and only two small Python helper scripts included. No downloads from external URLs or package installs; low-risk in terms of code being written to disk by an installer. Scripts write only local files/directories in the chosen workspace.
Credentials
The skill declares no environment variables, secrets, or config paths. The included scripts run only local filesystem checks and (optionally) invoke a local 'openclaw' CLI; they do not reference unrelated credentials or other services.
Persistence & Privilege
always is false and the skill does not request elevated or persistent platform privileges. It does recommend installing recurring cron jobs (expected for this functionality), which requires scheduler access; autonomous model invocation is allowed by default but not by itself a risk here.
Assessment
This skill appears to do what it says: create and verify a Markdown-based memory folder structure and check that three cron jobs are present. Before installing or allowing the agent to run it, review that you are comfortable with: 1) the scripts creating files/directories in your workspace (MEMORY.md and memory/...), 2) the requirement that cron jobs be installed/enabled (the skill does not auto-install them), and 3) the verify script calling a local 'openclaw cron list --json' if present. If you don't use the OpenClaw CLI or you don't want the agent to manage scheduler entries, skip cron installation and run the scripts with --skip-cron. As always, inspect the two small Python scripts (they are readable and local) and back up any existing memory files before running repairs or migrations.Like a lobster shell, security has layers — review code before you run it.
latestvk978k2rycswmefw5sqgscv8tfn837ktb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
