Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Memory Dreaming
v0.1.2A Markdown + JSON memory framework with conversation archiving for AI agents. Provides persistent long-term memory with biologically-inspired decay, recall b...
⭐ 0· 47·0 current·0 all-time
byPeter Rossi@ptburkis
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The scripts and documentation align with the stated purpose (local Markdown/JSON memory, conversation archiving, nightly 'dream' cycles). However the registry metadata claims no required env vars while README/SKILL.md explicitly require OPENROUTER_API_KEY or OPENAI_API_KEY for the summariser — a mismatch between declared requirements and actual behavior.
Instruction Scope
Runtime instructions and scripts will read OpenClaw session stores and workspace files, write archives and memory files, and (for summarisation) send conversation text to external LLM APIs. The summariser reads .env files and environment variables for API keys and applies regex-based redaction before sending — redaction can miss secrets. The SKILL.md also includes cron payload examples and agent-oriented instructions; a scanner flagged a 'system-prompt-override' pattern inside SKILL.md (see scan findings).
Install Mechanism
This is instruction-only (no install spec). Files are plain JS scripts copied into the workspace; no remote downloads or installers are executed by the skill itself. Risk from install mechanism is low, but running the scripts will write and modify files in the workspace.
Credentials
The skill actually requires an LLM API key for conversation summarisation (OPENROUTER_API_KEY or OPENAI_API_KEY) but registry metadata lists none. The summariser inspects local .env files and environment variables to find keys. That credential use is functionally justified for summarisation, but the mismatch in metadata and the broad file access (session stores, .env) merit caution.
Persistence & Privilege
The skill does not request always:true or other elevated platform privileges. It writes files in the workspace and can be scheduled via cron/heartbeat as documentation describes; this is expected for a memory/archiving tool and limited to its own files.
Scan Findings in Context
[system-prompt-override] unexpected: The SKILL.md and cron examples include agent-run payloads and long-form instructions. The scanner flagged a 'system-prompt-override' pattern — while some agent-oriented instructions are legitimate (cron payloads, dream-cycle directives), any embedded content that could be treated as a system-level prompt deserves manual review to ensure it can't be abused as prompt injection.
What to consider before installing
This skill is coherent with its stated goal (local memory + archiving), but review these before installing:
- Expectation vs reality: The registry lists no required env vars, yet the summariser will need an OpenRouter/OpenAI API key (found via .env files or env vars). If you don't want transcripts leaving your host, do not set an external API key or configure the summariser to use a self-hosted model.
- Data exfiltration risk: conversation-summarise sends chat transcripts to third-party APIs. It attempts to redact secrets using regex, but redaction is inherently imperfect — sensitive tokens, credentials, or PII could leak. If you must summarise externally, audit redactSecrets patterns for your environment or avoid external APIs.
- File access: the archiver reads OpenClaw session stores (paths include relative and absolute locations). Run the scripts in an isolated workspace or with least privilege to avoid touching other agents' session data.
- Prompt content: SKILL.md contains agent-oriented payloads and was flagged for 'system-prompt-override' patterns. Inspect SKILL.md and the cron payload examples to ensure nothing unintentionally overrides agent/system prompts when scheduled.
- Practical steps: (1) Inspect the six scripts yourself; (2) Run archiving locally with sample transcripts first; (3) If you need summarisation, prefer a self-hosted LLM or supply a dedicated API key with limited scope; (4) Remove or sanitize any .env files you don't want scanned; (5) Keep backups of MEMORY.md and memory/archive before running decay/prune operations.
Given the credential-metadata mismatch and the privacy-sensitive behavior (external LLM calls + regex redaction), treat this skill cautiously and verify configuration and code before enabling nightly automation.Like a lobster shell, security has layers — review code before you run it.
dreamingvk979z00f0vfa7fq5xh42g55yx9843tdqlatestvk979z00f0vfa7fq5xh42g55yx9843tdqmemoryvk979z00f0vfa7fq5xh42g55yx9843tdq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
