Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Plugin
v3.1.0End-to-end encrypted memory for AI agents — portable, yours forever. AES-256-GCM E2EE: server never sees plaintext.
⭐ 0· 225·0 current·0 all-time
byPedro Diogo@p-diogo
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
high confidencePurpose & Capability
The stated purpose (E2EE agent memory) matches the included code (crypto, API client, store/search/consolidation, hooks). However the registry/frontmatter claims no required env vars while README, config.ts and many modules clearly expect sensitive configuration (TOTALRECLAW_RECOVERY_PHRASE, TOTALRECLAW_SERVER_URL, and many LLM provider API keys). That metadata omission is incoherent and reduces transparency — a user would not expect a 'no-env' skill to read a recovery phrase and many API keys.
Instruction Scope
SKILL.md contains onboarding instructions (generate a recovery phrase, warnings, tools and lifecycle hooks). The file also includes assertive agent-facing directives (e.g., 'ALWAYS include this warning' and other prescriptive text). The pre-scan flagged a system-prompt-override pattern in SKILL.md — the skill's documentation/instructions could attempt to influence agent/system behavior beyond ordinary tool usage. Additionally SKILL.md/frontmatter claims no envs but the runtime text and README instruct setting sensitive env vars, which is contradictory.
Install Mechanism
There is no separate install spec in the registry (instruction-only), but the skill includes many code files, package.json and package-lock.json and depends on an external WASM package (@totalreclaw/core). That makes the runtime footprint non-trivial: code will run in the agent environment and import a third-party WASM module. No direct network-download URL for arbitrary archives is present, but the included code will make network calls to a default API URL (https://api.totalreclaw.xyz) unless overridden.
Credentials
Declared requirements list no env vars, but config.ts and README clearly expect several sensitive environment variables: TOTALRECLAW_RECOVERY_PHRASE (the user's only identity), TOTALRECLAW_SERVER_URL, and many LLM provider API keys (OPENAI_API_KEY, ANTHROPIC_API_KEY, GEMINI_API_KEY, etc.). Requesting numerous LLM keys is broader than expected for a memory storage plugin (it may explain extraction/reranking but the wide set of provider keys is disproportionate and increases risk if misused). Also auth key handling: code derives an auth key from the mnemonic and uses it (raw hex) as a Bearer token for server calls — that token is sensitive and will be sent to the configured server.
Persistence & Privilege
The skill hooks into agent lifecycle (before_agent_start, agent_end, pre_compaction) and is allowed autonomous invocation (disable-model-invocation=false). 'always' is false (good). Autonomous invocation plus the skill's ability to read a recovery phrase and LLM keys increases blast radius compared with an instruction-only tool, but the lifecycle behavior itself is expected for a memory plugin.
Scan Findings in Context
[system-prompt-override] unexpected: SKILL.md contains prescriptive agent-facing text and the scanner flagged patterns commonly used for prompt injection/system prompt overrides. For a memory plugin, instructional text that tries to alter agent/system prompts is unexpected and should be reviewed manually.
What to consider before installing
This skill appears to implement an encrypted agent memory, but there are several red flags you should address before installing or supplying secrets: 1) Metadata in the registry/frontmatter claims no environment variables, but the code and README require a 12-word recovery phrase (TOTALRECLAW_RECOVERY_PHRASE), a server URL, and potentially many LLM provider API keys — verify why each key is needed. 2) The recovery phrase is the single recovery mechanism and is highly sensitive; do not reuse any phrase tied to real crypto wallets (the README warns this), and avoid setting it as an env var on shared machines unless you trust both the client code and the server. 3) The skill will send a derived auth key (raw hex) as a Bearer token to the configured server (default api.totalreclaw.xyz); even if blobs are encrypted, the auth token and metadata are sent — audit the server and network endpoints before use. 4) The skill reads many unrelated provider API keys (OpenAI, Anthropic, Gemini, etc.); only provide keys you explicitly trust the skill to use. 5) SKILL.md includes strong prescriptive instructions and was flagged for a possible system-prompt override — manually inspect SKILL.md and the code for any instructions that would alter agent/system prompts or exfiltrate data. 6) Because the package uses a third-party WASM module (@totalreclaw/core) and contains client code that will run in your agent environment, review the source of that module and consider running the skill in an isolated/test agent (or self-host the server) first. If you are not able to audit the code and server, avoid providing the recovery phrase or LLM keys and prefer a local/self-hosted deployment. If more information (server source code, npm package provenance, or a clear list of env vars actually required at runtime) is provided, I can re-evaluate and raise or lower the risk assessment.index.ts:182
File read combined with network send (possible exfiltration).
SKILL.md:693
Prompt-injection style instruction pattern detected.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.Like a lobster shell, security has layers — review code before you run it.
agent-memoryvk977kanr7qfd1p6vnth3q4q1fd848vgze2e-encryptionvk977kanr7qfd1p6vnth3q4q1fd848vgze2eevk977kanr7qfd1p6vnth3q4q1fd848vgzencryptionvk977kanr7qfd1p6vnth3q4q1fd848vgzlatestvk977kanr7qfd1p6vnth3q4q1fd848vgzmemoryvk977kanr7qfd1p6vnth3q4q1fd848vgzpersistent-contextvk977kanr7qfd1p6vnth3q4q1fd848vgzprivacyvk977kanr7qfd1p6vnth3q4q1fd848vgz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
OSmacOS · Linux · Windows
