Agent Memory Ops

v0.1.1

Audit and maintain OpenClaw-style long-term memory. Use for MEMORY.md cleanup, daily-note digestion, duplicate detection, stale-memory review, and promoting...

0· 133·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for orime/agent-memory-ops.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Agent Memory Ops" (orime/agent-memory-ops) from ClawHub.
Skill page: https://clawhub.ai/orime/agent-memory-ops
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install agent-memory-ops

ClawHub CLI

Package manager switcher

npx clawhub@latest install agent-memory-ops
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match what is present: SKILL.md and scripts/memory_ops.py implement scanning MEMORY.md and memory/*.md, deduping, digesting, and reporting. No unrelated binaries, credentials, or config paths are requested.
Instruction Scope
Instructions correctly tell the agent to run the included Python script from the workspace root. The script reads MEMORY.md and files under memory/*.md and prints markdown/JSON reports including extracted bullet text. This is within scope, but note that the tool reads and outputs content from local files (which may contain sensitive data). The script contains heuristics to filter likely secrets but uses pattern matching (heuristic), so it may miss some secrets or redact too little — review outputs before promoting content.
Install Mechanism
No install spec is provided (instruction-only skill) and the repository includes a Python script to run. Nothing is downloaded or written to disk by an installer; running the script executes only local code.
Credentials
The skill declares no required environment variables, no primary credential, and no config paths. The script likewise does not read environment variables or external credentials. Requested access is proportional to the stated task (reading local memory files).
Persistence & Privilege
always:false and default autonomous-invocation are set (normal). The skill does not request permanent system-wide privileges or modify other skills' configs per the provided files.
Assessment
This skill appears coherent and implements the advertised memory-audit functionality, but take these precautions before running it: 1) Inspect the full scripts/memory_ops.py file yourself (the prompt included a truncated view) to confirm there are no hidden network calls or surprising behavior. 2) Run the script locally in a safe/dev environment first — it reads and prints items from MEMORY.md and memory/*.md, so outputs could expose sensitive content. 3) Don't run it against repos containing live secrets; the secret-detection is heuristic and can miss things. 4) Back up MEMORY.md before applying any automated changes and manually review suggestions before promoting items into curated memory.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dgnrmsmfk7a945mj9f2mj1183kb3rmemoryvk97dgnrmsmfk7a945mj9f2mj1183kb3ropenclawvk97dgnrmsmfk7a945mj9f2mj1183kb3ropsvk97dgnrmsmfk7a945mj9f2mj1183kb3r
133downloads
0stars
2versions
Updated 1mo ago
v0.1.1
MIT-0

Agent Memory Ops

Use this skill when you need to keep an agent's memory layer healthy instead of letting MEMORY.md rot.

What it does

  • scans MEMORY.md + memory/*.md
  • detects duplicate / near-duplicate bullets
  • extracts memory candidates from recent daily notes
  • surfaces active follow-ups / TODOs
  • filters obvious secrets from suggested memory output
  • produces a concise maintenance report you can act on

Good use cases

  • "帮我整理 MEMORY.md"
  • "检查记忆层有没有重复和过期信息"
  • "把最近几天的重要内容沉淀到长期记忆"
  • "做一次 agent memory audit"
  • "维护长期记忆 / daily memory / notebook memory"

Commands

Run from the workspace root that contains MEMORY.md and memory/.

python3 {baseDir}/scripts/memory_ops.py report --root .
python3 {baseDir}/scripts/memory_ops.py dedupe --root .
python3 {baseDir}/scripts/memory_ops.py digest --root . --days 7
python3 {baseDir}/scripts/memory_ops.py digest --root . --files 5 --format json

Recommended workflow

  1. Run report to see gaps, duplicates, and follow-ups.
  2. Run digest on the last 5-7 daily notes.
  3. Promote only durable facts into MEMORY.md.
  4. Keep volatile chatter in daily notes.
  5. Never copy secrets into curated memory unless the user explicitly asks.

Output policy

  • Prefer --format markdown for human review.
  • Prefer --format json when another tool or script will consume the result.
  • The script intentionally redacts / skips likely secrets from digest suggestions.

References

  • references/playbook.md

Comments

Loading comments...