Smart Context Manager

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or autonomous use of the replacement command could reset the active session and alter the agent's future context, though the skill says it creates a backup.

Why it was flagged

The skill exposes a destructive session-state mutation workflow. It is disclosed and purpose-aligned, but it can reset and rewrite an OpenClaw session without an explicit confirmation step shown in the artifacts.

Skill content
Compress session: generate summary, reset, inject (DESTRUCTIVE) ... Reset: Deletes the JSONL file ... Inject: Sends the AI-generated summary as the first message in the fresh session
Recommendation

Use --replace only after explicit user approval, require a specific session key, and add a confirmation or dry-run mode before deleting or reinjecting session context.

What this means

Important details may be omitted or distorted, and unwanted instructions from the old session could become part of the new session's working memory.

Why it was flagged

A model-generated summary of prior conversation is persisted and reused as the new session's initial context, which can carry forward mistaken, stale, or adversarial instructions from the previous context.

Skill content
AI Summarization: Sends a prompt to the agent asking it to summarize its own context ... Inject: Sends the AI-generated summary as the first message in the fresh session
Recommendation

Review the generated summary before reinjection, strip secrets and instructions that should not persist, and consider separating factual summaries from executable guidance.

ConcernMedium Confidence
ASI08: Cascading Failures
What this means

A single targeting mistake could reset or rewrite an unintended OpenClaw session, potentially disrupting future work in that session.

Why it was flagged

The helper supports operating on the most recently updated session when no explicit target is provided. If combined with reset/replacement behavior, an omitted or wrong target could affect the wrong session.

Skill content
if [[ -z "$target_session" ]]; then
        # Get the most recently updated session
        session_data=$(echo "$sessions_json" | jq -r '.sessions | sort_by(.updatedAt) | last')
Recommendation

Require an explicit session key for destructive operations and show the selected session details before proceeding.

What this means

The script can act through the local OpenClaw gateway and interact with the user's agent sessions.

Why it was flagged

The skill uses the user's local OpenClaw authority to list sessions and send agent messages. This is expected for the purpose, but it is privileged local agent access.

Skill content
Gateway access - Script uses `openclaw agent` and `openclaw sessions`
Recommendation

Install only if you trust the skill to use your local OpenClaw session authority, and avoid running it in environments where sessions contain sensitive material you do not want copied or summarized.

What this means

Users relying only on registry metadata may not realize the skill needs local CLI tools and session-state access.

Why it was flagged

The registry metadata does not declare dependencies or capability tags, even though the skill documentation and script require jq/openclaw and access local OpenClaw session state.

Skill content
Required binaries (all must exist): none ... Install specifications: No install spec ... Capability signals: No capability tags were derived.
Recommendation

Declare required binaries and local state access in metadata so users can make an informed decision before running the script.