smart notes using sqlite3
Analysis
This looks like a coherent local memo-management skill, with expected local storage and user-directed import/edit/delete features but no artifact evidence of exfiltration or hidden behavior.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
python scripts/memos.py import <文件路径> python scripts/memos.py delete <ID> python scripts/memos.py archive <ID>
The documented CLI can read user-selected files into the memo database and mutate memo records by deleting or archiving them.
Source: unknown; Homepage: none; Version: 1.0.0
The registry metadata has limited provenance information, and the included package.json reports version 1.2.0, creating a minor version/provenance ambiguity.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
数据库: `~/.qclaw/workspace/memos/memos.db`
The skill explicitly persists memo and imported-note content in a local SQLite database, making it reusable across later interactions.
