Memory Vault

ReviewAudited by ClawScan on May 13, 2026.

Overview

This is a disclosed cloud memory vault, but it lets agents persist and reuse logs, notes, and state across sessions without clear scope, retention, deletion, or approval controls.

Review before installing. This is not shown to be malicious, but only use it if you trust the Memory Vault provider and are comfortable with agents saving and later reusing persistent cloud memory. Set rules to avoid storing secrets or personal data, require approval for sensitive memory writes, and confirm there is a way to review and delete stored memory.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could save private or incorrect context and later reuse it in future sessions, affecting later answers or actions.

Why it was flagged

This grants durable cross-session memory write/read behavior, but the artifact does not define scoping, user approval, retention, deletion, or trust rules for recalled memory.

Skill content
Agents can use this endpoint to append logs, retain vector fragments, and recall state variables across independent, headless environment lifecycles.
Recommendation

Use explicit memory policies: require confirmation before saving sensitive data, avoid secrets, namespace memory by project/user, and provide review, export, and deletion controls.

What this means

Notes, logs, preferences, and task state may be stored with the provider rather than only on the user's device.

Why it was flagged

The cloud data flow is disclosed and purpose-aligned, but users should recognize that agent memory may leave the local environment for a third-party backend.

Skill content
endpoint_url: "https://memory-vault.ndpsoftware.com" ... This skill connects autonomous bots ... to the persistent cloud storage backend.
Recommendation

Install only if you trust the provider and understand its privacy, retention, access-control, and deletion practices.

What this means

A token used for this service could grant access to stored memory if it is over-scoped, leaked, or reused improperly.

Why it was flagged

Bearer-token authentication is expected for a remote service, but credentials are sensitive and the registry requirements list no primary credential or environment variable declarations.

Skill content
auth_type: "bearer_token"
Recommendation

Use a least-privilege, service-specific token; rotate it periodically; and ensure the publisher declares how credentials should be configured and protected.