Sylex Memory

WarnAudited by ClawScan on May 10, 2026.

Overview

Review before installing: this skill connects your agent to a remote persistent memory and sharing service and encourages automatic storing and sharing without clear safeguards.

Install only if you are comfortable using a third-party remote memory service. Remove or modify the SOUL instructions that store and share automatically, keep the agent identifier secret, avoid storing secrets or confidential data, and require explicit review before any Commons or direct-message sharing.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private or project-specific context could be saved and reused in future sessions without the user realizing it, and inaccurate or unsafe memories could influence later agent behavior.

Why it was flagged

This explicitly directs autonomous persistent memory writes without user confirmation, scope limits, retention controls, or exclusions for sensitive information.

Skill content
When I learn something worth remembering, I store it immediately. I don't wait to be asked.
Recommendation

Require user confirmation before storing memories, define what must never be saved, provide delete/edit controls, and treat recalled memories as untrusted context rather than authoritative instructions.

What this means

Sensitive work patterns or internal details could be shared with other agents, and untrusted Commons content could influence the agent at session start.

Why it was flagged

The skill instructs the agent to both consume and publish inter-agent shared content. Combined with SKILL.md's disclosure that Commons contributions are plaintext, this lacks a clear user approval boundary.

Skill content
Browse Commons for new shared knowledge... When I discover a useful pattern, I contribute it to the Commons so other agents benefit.
Recommendation

Make Commons browsing and contribution opt-in per action, show users exactly what will be shared, strip secrets and project identifiers, and treat shared content as untrusted.

What this means

If the identifier is weak, reused, stored in shared context, or leaked, another party may be able to access or alter the agent's memory.

Why it was flagged

The agent identifier functions like an access secret for memory retrieval/storage, but the skill presents it as not requiring a credential and does not describe rotation, revocation, or secrecy requirements.

Skill content
No API key needed. Your agent identity is derived from a SHA-256 hash you choose — it's your key to your memories.
Recommendation

Treat the identifier as a credential, generate it with high entropy, avoid storing it in shared files or prompts, and provide clear rotation/revocation guidance.

What this means

Users may store highly sensitive information because they believe the operator cannot read it, even though that guarantee cannot be verified from the reviewed artifacts.

Why it was flagged

These are strong privacy assurances for a remote memory service, but the supplied artifacts contain no implementation or client-side encryption details to substantiate them.

Skill content
All private memories are encrypted with your agent key; The service operator cannot read your memory content; No tracking, no analytics, no data selling
Recommendation

Verify the service's encryption design and privacy policy independently before storing sensitive data, and avoid saving secrets or confidential customer/project information.

What this means

Trust depends on the remote service operator and endpoint behavior rather than inspectable local skill code.

Why it was flagged

The package mainly points the agent at a remote MCP service, so the backend behavior and future changes are outside the locally reviewed artifact set.

Skill content
Source: unknown; Homepage: none; No code files present — this is an instruction-only skill.
Recommendation

Confirm the provider identity and documentation before use, and monitor the MCP server configuration for unexpected endpoint changes.