EasyClaw Brain Migration
v0.1.0Migrate EasyClaw workspace-level behavior into a new OpenClaw workspace by locating and comparing old EasyClaw brain files such as AGENTS.md, SOUL.md, MEMORY...
⭐ 0· 184·0 current·0 all-time
bysjinopenclaw@sjingh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name/description match the included scripts and SKILL.md: both search ~/.easyclaw/workspace, stage files into ~/.openclaw/workspace/imports/easyclaw, and optionally import MEMORY.md and memory/ into the active workspace. Nothing requested or included (no network code, no extra credentials) is inconsistent with a migration tool.
Instruction Scope
Instructions explicitly tell the agent to run the two included Python scripts which enumerate, stage, and (optionally) import files. This requires reading many user-home files (AGENTS.md, SOUL.md, MEMORY.md, memory/, LaunchAgents listings). That is appropriate for migration, but it does mean the skill will read/copy potentially sensitive workspace data—users should review staged files before importing.
Install Mechanism
No install spec is present and this is an instruction+script skill. There is no package download or archive extraction; the code runs locally with the user's Python interpreter. This is a low install risk.
Credentials
The skill requires no environment variables or external credentials. The scripts operate on filesystem paths under the user's home directory only, which is proportionate to the migration task.
Persistence & Privilege
The skill is not marked always:true and does not modify other skills or system-wide agent settings. It performs filesystem operations only within the user's workspace paths and creates backups/staged copies within ~/.openclaw/workspace; autonomous invocation is allowed by default (not a red flag on its own).
Assessment
This skill appears to do exactly what it claims: scan ~/.easyclaw/workspace, stage files into ~/.openclaw/workspace/imports/easyclaw, and optionally import MEMORY.md and memory/ into the active workspace. Before running: (1) run python3 scripts/report_easyclaw_brain.py first to see what will be found; (2) inspect the staged files in imports/easyclaw/ before using --import-memory; (3) be aware MEMORY.md and memory/ may contain sensitive secrets—do not import blindly; (4) consider making a full backup of ~/.openclaw/workspace before importing; (5) review the two included scripts if you want assurance there is no hidden behavior (they are short and filesystem-only); and (6) note that launchd plists are only listed, not auto-copied—automation wiring must be rebuilt manually. Proceed if you accept the tool will read and copy files under your home directory.Like a lobster shell, security has layers — review code before you run it.
latestvk97a8xce5sgwqr85adnfymh73x82n7a8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
