Weekly Retro

v1.0.0

Weekly retrospective that analyzes memory logs to identify accomplishments, recurring patterns, friction points, and forward-looking recommendations. More st...

0· 69·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (weekly retrospective over memory logs) matches the included scripts and SKILL.md: gather_week.py reads memory files, analyze.py finds patterns, retrospective.py writes a markdown report, and history.py records longitudinal data. Defaults and example config point at local workspace files, which is appropriate for a retrospective tool.
Instruction Scope
Instructions operate on local markdown memory files (default ~/.openclaw/workspace/memory) and produce a vault/weekly-retro output; analyze.py can also read SOUL.md and AGENTS.md (if provided) and history.py reads/writes a history JSON. This is consistent with the tool's purpose, but it means the skill will read all content in the specified memory directory (and any additional files you point it at), so sensitive data in those logs will be included in analysis/output.
Install Mechanism
No install spec is provided; the skill is instruction/code-only and uses Python standard library only. Nothing is downloaded or executed from external URLs during installation.
Credentials
The skill requests no environment variables or credentials. The example config references local files (memory_dir, vault_output_dir, history_file, SOUL.md, AGENTS.md) which are reasonable for the function but may cause the tool to read additional workspace files if configured that way. No unexplained secrets or external service keys are required.
Persistence & Privilege
always is false and the skill does not request permanent platform-wide privileges. It writes output (markdown) and a history JSON into user workspace paths (configurable), which is expected for this functionality and scoped to its own data files.
Assessment
This skill appears to do what it says: read local memory logs, analyze patterns, and produce a markdown retrospective. Before running it: 1) Inspect the memory files that will be read (default ~/.openclaw/workspace/memory) for any secrets or sensitive content you don't want included; 2) Run the pipeline against a small test directory first (use --memory-dir to point to a safe test folder) to see output format; 3) Note that analyze.py can read SOUL.md and AGENTS.md if you pass those paths or configure them — don't point it at files with credentials; 4) The skill writes reports and a history file into your workspace (vault/history paths are configurable) — ensure those output locations are acceptable; 5) There is no network/exfiltration observed in the code, but always run third-party scripts in a controlled environment if you have high sensitivity requirements.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bdjz85a1m3vw8hn4pe6vek583x8yz

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments