AgentMem
v2.4.0Cloud memory for AI agents. Writes are free, pay only for reads. First 25 calls free, 7-day persistence.
⭐ 5· 2.4k·2 current·2 all-time
by@natmota
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (cloud memory for agents) aligns with the provided instructions and demo script: PUT/GET to https://api.agentmem.io for storing and retrieving memories. No unrelated cloud providers or unrelated credentials are requested.
Instruction Scope
SKILL.md instructs agents to automatically check GET /v1/bootstrap on session start and to 'flush critical context' to AgentMem. That encourages sending arbitrary agent context (potentially sensitive) to a third-party endpoint and making automatic reads (which this service charges for). Examples also show making local file reads (cat memory/...) and publishing 'public' memories. There are no warnings about avoiding sensitive data or guidance about what should not be stored—this broad instruction set increases the risk of data leakage and unexpected charges.
Install Mechanism
This is instruction-only (no install spec) which is low-risk from an installer perspective. However the included demo.sh assumes availability of jq (used in output processing) even though required binaries list is empty—minor operational mismatch. No downloaded code or external installers are present.
Credentials
The skill declares no required env vars, and the SKILL.md uses an optional AGENTMEM_API_KEY for permanent storage—this is proportionate. However, the instructions do show usage of Authorization headers and a header 'X-Wallet: 0xYourAddress' for balance checks; the skill does not request or explain storing credentials securely. Because reads are billable, providing an API key could lead to charges if the agent auto-reads frequently.
Persistence & Privilege
always is false and the skill does not request persistent platform-level privileges or modify other skills. Autonomous invocation is allowed (platform default); combined with automatic GET/PUT instructions this could cause repeated reads (billing) or writes, but that is an operational risk rather than an unexplained privilege escalation.
What to consider before installing
Key things to consider before installing:
- Privacy risk: The skill's core behavior is to send and retrieve agent context to a third-party (api.agentmem.io). By default examples show storing data without an API key and publishable 'public' memories. Do NOT store secrets, passwords, PII, or other sensitive context unless you fully trust the service and its retention policy.
- Billing risk: Writes are free but reads are billable. SKILL.md suggests agents should auto-check /v1/bootstrap on session start. If your agent invokes the skill autonomously, it may perform reads frequently and incur charges (or exhaust free calls). Only provide an API key if you understand the cost model and usage patterns.
- Provenance: There is no homepage or source repository listed and the owner is an opaque ID. Consider verifying the service (agentmem.io) independently, checking its privacy/security policy, and ensuring the domain is legitimate before sending any real data.
- Operational mismatch: demo.sh uses jq but the skill metadata lists no required binaries. If you run the demo locally, ensure jq is installed, and review demo.sh to understand what it sends to the service (it uses a public/demo token).
- Safer alternatives: If you need persistent memory but worry about privacy, prefer a self-hosted store or a memory provider from a vendor you control. If you still want to try this skill, restrict the data sent (use synthetic/test data), monitor network calls and billing, and avoid enabling automatic/unbounded sync of agent context.
If you want, I can: (1) extract every curl command the skill will run and highlight which leak agent-local data, (2) draft a safe SKILL.md variant that warns about sensitive data and disables automatic bootstrap, or (3) suggest alternative self-hosted memory designs.Like a lobster shell, security has layers — review code before you run it.
latestvk975574x839pcw656nekpnxnw180md0n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
