Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Memory Extraction

v1.0.1

自动识别对话中的实体、关系和事实观察,实时更新知识图谱以维护用户记忆信息。

0· 50·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The SKILL.md describes extracting entities/relations/observations and writing a knowledge graph, which fits the name. However the instructions reference specific local files and functions (scripts/knowledge_graph_manager.py, memory/knowledge-graph.jsonl, APIs like search_nodes/read_graph/create_entities) that are not included in the package and were not declared as required config paths. That mismatch (instructions expecting local code/storage while the skill is instruction-only) is incoherent and could lead the agent to try to read/write unexpected local files.
!
Instruction Scope
The runtime instructions direct the agent to proactively identify and persist wide-ranging personal data (identity: age/gender/location/education, behaviors, preferences, goals, and relationships up to 3 degrees). They also instruct modifying the system prompt and to perform reads/writes to local paths. Proactive capture and storage of sensitive PII without clear consent controls is a privacy risk and expands scope beyond a narrow helper.
Install Mechanism
No install spec and no code files are included — lowest installation risk. There is nothing being downloaded or executed by an installer in the package metadata.
Credentials
The skill requests no environment variables or credentials, which is proportionate. However, despite no credential requests, the instructions require persistent local storage of potentially sensitive personal information (emails, locations, relationships). Lack of declared config paths for those storage locations is discrepant and increases risk of unintended local-file access.
Persistence & Privilege
always is false (good). But the SKILL.md instructs integration into the agent's System Prompt and to persist memories to local files, which grants ongoing behavioral influence and persistent data storage. The skill does not request system-wide privileges explicitly, but the combination of system-prompt modification and persistent local storage is a privilege-sensitivity concern and should be handled with explicit user consent and access controls.
What to consider before installing
This skill looks like a memory manager but has gaps and privacy implications you should resolve before using it. Ask the publisher for the missing code (knowledge_graph_manager.py) and a homepage/source repo so you can review how data is stored and protected. Confirm exactly where memory files are written and who can read them. Consider these safeguards before installing: (1) require explicit user consent before recording PII, (2) restrict which fields are stored (avoid emails/relations if not needed), (3) put the memory file in a controlled directory with access controls and encryption, (4) avoid automatic System Prompt injection unless you review and approve the prompt changes, and (5) only enable the skill in trusted contexts. If you can’t review implementation details or control what is recorded, treat the skill as high-risk and do not enable it for sensitive conversations.

Like a lobster shell, security has layers — review code before you run it.

knowledge-graphvk97425pyydq5bp7tqgca52ahmx83waqrlatestvk97e0s2ckry3cnqb36xgarz6vh83wne9mcpvk97425pyydq5bp7tqgca52ahmx83waqrmemoryvk97425pyydq5bp7tqgca52ahmx83waqr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments