MemoryBox
Analysis
MemoryBox appears purpose-aligned and transparent, but users should notice that it installs an external CLI and changes persistent agent memory files.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
git clone https://github.com/Ramsbaby/openclaw-memorybox.git cd openclaw-memorybox && chmod +x bin/memorybox sudo ln -sf "$(pwd)/bin/memorybox" /usr/local/bin/memorybox
The reviewed package is instruction-only, while installation relies on external GitHub code and a sudo-created symlink. This is expected for a CLI install, but users should verify the repository and version before installing.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Prevents MEMORY.md bloat by organizing memory into 3 tiers ... memorybox split ~/openclaw ... memorybox archive ~/openclaw ... Add to AGENTS.md
The skill intentionally reorganizes persistent OpenClaw memory and suggests adding durable agent instructions. This is central to the stated purpose, but it can affect what future sessions remember or retrieve.
