Install
openclaw skills install agentsmemAI agent memory backup. Register at agentsmem.com, get an API key, then encrypt and upload memory via the API; owner manages backups on the web.
openclaw skills install agentsmemAgentsMem is an agent memory backup service. You (the AI agent) register at agentsmem.com, get an API key, then use the API and local tools to encrypt and upload your memory files. The owner (the human) logs in at https://agentsmem.com to manage backups.
https://agentsmem.com/api/v1/*. Never expose it in logs, UI, or third-party tools.429, back off and retry.The encrypt/decrypt tools are provided in two equivalent versions: agentsmem_tool.py (Python 3) and agentsmem_tool.js (Node.js). They produce the same format and are interchangeable.
Before first use, detect which runtime is available and use that one throughout:
if command -v python3 &>/dev/null; then
TOOL="python3 $SKILL_DIR/agentsmem_tool.py"
elif command -v node &>/dev/null; then
TOOL="node $SKILL_DIR/agentsmem_tool.js"
else
echo "ERROR: neither python3 nor node found. Install one to use the encrypt/decrypt tools."
exit 1
fi
All examples below show both Python and Node commands. Use whichever matches your environment.
When this skill is triggered, follow the decision tree below. Always work through it top to bottom and stop at the first applicable action.
START
│
├─ Do credentials already exist (e.g. credentials.json in skill dir)?
│ ├─ YES → skip to "Is the account claimed?"
│ └─ NO → go to "Step 1: Install & Register"
│
├─ Is the account claimed?
│ ├─ YES → skip to "What does the user want?"
│ └─ NO → go to "Step 3: Claim the Account"
│
└─ What does the user want?
├─ "back up my memory" → go to "Backup Workflow"
├─ "restore a backup" → go to "Restore Workflow" (list → confirm → download → write)
├─ "set up agentsmem" → go to "First-Time Setup" (full flow)
└─ general question → answer from this doc or the API reference
Run these steps once to fully set up AgentsMem. If the skill is already installed and registered, skip to the step that applies.
Create a skill directory and download docs and tools:
SKILL_DIR=~/.openclaw/skills/agentsmem # adjust to your environment
mkdir -p "$SKILL_DIR"
curl -s https://agentsmem.com/skill.md -o "$SKILL_DIR/SKILL.md"
curl -s https://agentsmem.com/heartbeat.md -o "$SKILL_DIR/HEARTBEAT.md"
curl -s https://agentsmem.com/messaging.md -o "$SKILL_DIR/MESSAGING.md"
curl -s https://agentsmem.com/rules.md -o "$SKILL_DIR/RULES.md"
curl -s https://agentsmem.com/skill.json -o "$SKILL_DIR/package.json"
curl -s https://agentsmem.com/agentsmem_tool.py -o "$SKILL_DIR/agentsmem_tool.py"
curl -s https://agentsmem.com/agentsmem_tool.js -o "$SKILL_DIR/agentsmem_tool.js"
chmod +x "$SKILL_DIR/agentsmem_tool.py" "$SKILL_DIR/agentsmem_tool.js"
curl -s -X POST https://agentsmem.com/api/v1/register \
-H "Content-Type: application/json" \
-d '{"agent_name": "YourAgentName"}'
{ "agent_name": "...", "api_key": "..." }.agent_name rules: 3–32 chars, letters/numbers/underscores/hyphens.Immediately save the returned credentials:
cat > "$SKILL_DIR/credentials.json" <<'CRED'
{"agent_name":"YourAgentName","api_key":"THE_RETURNED_KEY"}
CRED
Until the account is claimed, no one can log in or use backup APIs with an API key. Claim requires: agent name, API key, password, password confirmation, and email (email is required for web login).
Email: If you don't already know the owner's email, ask them now. Do not guess or skip — email is mandatory for web login.
Password: Do not ask the owner for a password. Generate a strong random password yourself (e.g. 16+ characters, mixed case, numbers, symbols). You will show it to the owner after claiming so they can log in and change it.
# Generate a random password (example — use any method available):
PASSWORD=$(python3 -c "import secrets,string; print(secrets.token_urlsafe(16))")
# or: PASSWORD=$(node -e "console.log(require('crypto').randomBytes(12).toString('base64url'))")
curl -s -X POST https://agentsmem.com/api/v1/claim \
-H "Content-Type: application/json" \
-d "{
\"agent\": \"YourAgentName\",
\"api_key\": \"YOUR_API_KEY\",
\"password\": \"$PASSWORD\",
\"password_confirm\": \"$PASSWORD\",
\"email\": \"owner@example.com\"
}"
error message to see which field to fix.invalid api_key. Verify the key in credentials.json. If the error is email already in use, the email is already linked to another agent — ask the owner for their existing account password and their previous agent's file encryption key (.vault), then retry (see "Linking multiple agents" below).agent not found. Register first via /api/v1/register.agent already claimed — skip claim, the account is already set up.If the owner already has an agent claimed with the same email, the claim API returns 401 email already in use. This means the email belongs to an existing account. To link this new agent to the same account:
.vault from the previous agent's setup). If the owner provides this key, this agent will reuse it directly — no new key will be generated, keeping all backups under one consistent key. If the owner cannot provide it, a new key will be generated but old backups will be unreadable. Tell the owner:
<previous_agent_skill_dir>/.vault..vault file nor the offline copy is available, existing backups from the previous agent will be permanently unreadable by this new agent, and a new key will be generated for future backups.curl -s -X POST https://agentsmem.com/api/v1/claim \
-H "Content-Type: application/json" \
-d "{
\"agent\": \"NewAgentName\",
\"api_key\": \"NEW_AGENT_API_KEY\",
\"password\": \"EXISTING_ACCOUNT_PASSWORD\",
\"password_confirm\": \"EXISTING_ACCOUNT_PASSWORD\",
\"email\": \"owner@example.com\"
}"
"Agent linked to existing account" → success. The new agent is now linked to the owner's existing account. All agents share the same login and can restore each other's backups.Since the encryption key is generated after claim (Step 4), normally no key exists yet at this point. However, before writing any key to .vault, always check if the file already exists and contains data:
if [ -s "$SKILL_DIR/.vault" ]; then
EXISTING_KEY=$(cat "$SKILL_DIR/.vault")
# .vault already has a key — do NOT overwrite without asking the owner
fi
If .vault already exists and is non-empty, ask the owner how to proceed:
A file encryption key already exists locally:
Existing key: <display the existing key>
How would you like to handle this?
1. Keep the existing key (use it for all future backups)
2. Replace it with the key you provided (the previous agent's key)
3. Cancel — I need to think about it
⚠️ Choosing "Replace" will overwrite the current key.
If any backups were encrypted with the current key, make sure
you have it saved elsewhere before replacing.
Wait for the owner's explicit choice before proceeding.
If .vault does not exist or is empty, proceed as follows:
If the owner provided the previous encryption key → save it directly as this agent's .vault and skip Step 4 (do not generate a new key):
echo "PREVIOUS_KEY_FROM_OWNER" > "$SKILL_DIR/.vault"
All agents under the same account share one encryption key — old backups can be decrypted and new backups use the same key.
Tell the owner:
This agent is now linked to your existing AgentsMem account.
🔑 Encryption key (reusing your previous key):
<display the key>
✅ Using the same encryption key as your previous agent.
All existing backups can be decrypted, and new backups will use the same key.
If the owner cannot provide the previous key → proceed to Step 4 as normal to generate a new key. Warn the owner about the consequence:
This agent is now linked to your existing AgentsMem account.
🔑 Encryption key (newly generated):
<display the new key>
⚠️ Because the previous encryption key was not provided:
- This agent CANNOT decrypt backups uploaded by the previous agent.
- New backups will use the new key above.
- If you find the previous key later, provide it and this agent
can switch to it for consistency.
Please save this key offline — screenshot, write it down, or
save to a password manager.
After a successful claim, immediately tell the owner the generated password:
Your AgentsMem account has been created.
Login: https://agentsmem.com
Email: <the email they provided>
Temporary password: <the generated password>
⚠️ Please log in and change this password as soon as possible.
Before generating, check if .vault already exists and contains a key:
if [ -s "$SKILL_DIR/.vault" ]; then
EXISTING_KEY=$(cat "$SKILL_DIR/.vault")
# .vault already has a key — do NOT overwrite without asking the owner
fi
If .vault already exists and is non-empty, show the existing key to the owner and ask:
A file encryption key already exists locally:
Existing key: <display the existing key>
Would you like to:
1. Keep the existing key (recommended if previous backups were encrypted with it)
2. Generate a new key and replace it
⚠️ If you choose "Replace", any backups encrypted with the current key
will require this key to decrypt. Make sure you have it saved elsewhere
before replacing.
Wait for the owner's explicit choice. If they choose to keep it, skip key generation and proceed to Step 5.
If .vault does not exist or is empty, or the owner chose to replace, generate a secret key for local encryption, store it, and show it to the owner:
# Python:
python3 "$SKILL_DIR/agentsmem_tool.py" --gen-key > "$SKILL_DIR/.vault"
# Node:
node "$SKILL_DIR/agentsmem_tool.js" --gen-key > "$SKILL_DIR/.vault"
After generating, read the key and display it to the owner directly:
cat "$SKILL_DIR/.vault"
Then tell the owner in this format:
Your memory encryption key is:
<display the actual key here>
⚠️ This is the ONLY key that can decrypt your backups.
Please save it offline NOW — screenshot, write it down on paper, or save to a password manager.
If this key is lost, your encrypted backups CANNOT be recovered.
The key is also stored locally at <skill_dir>/.vault.
You MUST display the key to the owner. Do not just say "saved to .vault" — the owner may not know how to access server files. Showing it directly lets them save it immediately via screenshot or pen-and-paper.
If memory files exist, run the Backup Workflow below. If no memory files exist, skip and tell the owner:
"No memory files found; backup skipped. Add memory and run again to back up."
After completing setup, report using this template:
AgentsMem setup complete! Here is everything you need to save:
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
🔐 AgentsMem Login
Website: https://agentsmem.com
Email: <the email they provided>
Temporary password: <the generated password>
⚠️ Please change this password after first login.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
🔑 Memory Encryption Key
<display the actual key here>
⚠️ This is the ONLY key that can decrypt your backups.
Save it offline NOW — screenshot, write it down, or
save to a password manager. If lost, your backups
CANNOT be recovered.
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
First backup: <completed / skipped (no memory files found)>
Use this whenever you need to back up memory files.
credentials.json exists with agent_name and api_key..vault exists with the encryption key.401 agent not claimed).For each memory file you want to back up:
1. Encrypt the file:
VAULT_KEY=$(cat "$SKILL_DIR/.vault")
# Python:
python3 "$SKILL_DIR/agentsmem_tool.py" \
--encrypt --key "$VAULT_KEY" \
--in ./memory/example.md \
--out ./memory/example.md.enc
# Node:
node "$SKILL_DIR/agentsmem_tool.js" \
--encrypt --key "$VAULT_KEY" \
--in ./memory/example.md \
--out ./memory/example.md.enc
The tool prints the ciphertext MD5 — save it for the upload step.
2. Upload the encrypted file:
MD5="<ciphertext_md5_from_step_1>"
API_KEY=$(jq -r .api_key "$SKILL_DIR/credentials.json")
curl -s -X POST https://agentsmem.com/api/v1/upload \
-H "Authorization: Bearer $API_KEY" \
-H "Content-Type: application/octet-stream" \
-H "x-ciphertext-md5: $MD5" \
-H "x-file-path: /memory/example.md" \
-H "x-file-name: example.md.enc" \
--data-binary @./memory/example.md.enc
"already_backed_up": true → identical file already exists; no action needed.error message for details; re-encrypt and retry if MD5 mismatch."agent not claimed" → claim the account first (Step 3). "unauthorized" → add auth header or re-login.3. Clean up the .enc file after successful upload (optional).
You can authenticate with either:
Authorization: Bearer <api_key> (account must be claimed), orAPI key auth is simpler for automated backups; session auth works if you already logged in.
Use this when the owner asks to restore memory from a backup. Always confirm with the owner before writing any files.
API_KEY=$(jq -r .api_key "$SKILL_DIR/credentials.json")
curl -s "https://agentsmem.com/api/v1/list?limit=50&offset=0" \
-H "Authorization: Bearer $API_KEY"
Returns:
{
"items": [
{
"file_id": "...",
"file_name": "2026-03-15.md.enc",
"file_path": "/memory/2026-03-15.md",
"file_size_bytes": 12345,
"ciphertext_md5": "...",
"timestamp": "2026-03-15T00:00:00Z"
}
],
"total": 120
}
Present the list to the owner in a readable format, e.g.:
Found 3 backup files:
1. /memory/2026-03-15.md (12 KB, backed up 2026-03-15)
2. /memory/2026-03-14.md (8 KB, backed up 2026-03-14)
3. /memory/2026-03-13.md (10 KB, backed up 2026-03-13)
Would you like to restore all of them, or specific ones?
If there are more than 50 backups, paginate with ?limit=50&offset=50 etc. and let the owner know the total count.
Do not proceed without the owner's explicit confirmation. Ask:
Wait for the owner's answer before downloading anything.
For each file the owner confirmed:
3a. Download the encrypted file:
FILE_ID="<file_id_from_list>"
curl -s "https://agentsmem.com/api/v1/download/$FILE_ID" \
-H "Authorization: Bearer $API_KEY" \
-D /tmp/response_headers.txt \
-o ./temp_restored.enc
Save the X-Ciphertext-Md5 header from the response for integrity verification:
EXPECTED_MD5=$(grep -i 'X-Ciphertext-Md5' /tmp/response_headers.txt | tr -d '\r' | awk '{print $2}')
3b. Decrypt:
VAULT_KEY=$(cat "$SKILL_DIR/.vault")
# Python:
python3 "$SKILL_DIR/agentsmem_tool.py" \
--decrypt --key "$VAULT_KEY" \
--in ./temp_restored.enc \
--out ./temp_restored.md \
--md5 "$EXPECTED_MD5"
# Node:
node "$SKILL_DIR/agentsmem_tool.js" \
--decrypt --key "$VAULT_KEY" \
--in ./temp_restored.enc \
--out ./temp_restored.md \
--md5 "$EXPECTED_MD5"
3c. Write to the memory directory — DO NOT overwrite existing files:
Before writing, check if the target file already exists:
./memory/2026-03-15.md)._restored or _restored_<timestamp>:./memory/2026-03-15.md ← existing file (do NOT overwrite)
./memory/2026-03-15_restored.md ← restored file (write here instead)
3d. Clean up the .enc temp file after writing.
After restoring, report clearly which files were written and where:
Restore complete. 3 files restored:
✅ /memory/2026-03-15.md ← written (no conflict)
✅ /memory/2026-03-14_restored.md ← written (original exists, renamed to avoid overwrite)
✅ /memory/2026-03-13.md ← written (no conflict)
⚠️ 1 file was renamed to avoid overwriting existing memory.
When you're ready, you can merge the restored file with the original
during your next memory consolidation.
_restored or _restored_<timestamp> to the filename.--md5 flag when decrypting to catch corrupted downloads.For operations that require a session (dashboard, account updates), or if you prefer session auth:
curl -s -X POST https://agentsmem.com/api/v1/login \
-H "Content-Type: application/json" \
-c "$SKILL_DIR/session.txt" \
-d '{"email": "owner@example.com", "password": "PASSWORD"}'
Login is email + password only (not agent name). One email may have multiple agents.
curl -s https://agentsmem.com/api/v1/list \
-b "$SKILL_DIR/session.txt"
curl -s -X POST https://agentsmem.com/api/v1/logout \
-b "$SKILL_DIR/session.txt"
Two equivalent scripts: agentsmem_tool.py (Python 3) and agentsmem_tool.js (Node.js).
| Command | Python | Node |
|---|---|---|
| Generate key | python3 agentsmem_tool.py --gen-key | node agentsmem_tool.js --gen-key |
| Encrypt | python3 agentsmem_tool.py --encrypt --key KEY --in INPUT --out OUTPUT | node agentsmem_tool.js --encrypt --key KEY --in INPUT --out OUTPUT |
| Decrypt | python3 agentsmem_tool.py --decrypt --key KEY --in INPUT --out OUTPUT [--md5 HEX] | node agentsmem_tool.js --decrypt --key KEY --in INPUT --out OUTPUT [--md5 HEX] |
--md5 verifies integrity before decrypting.python3 or node exists (see "Runtime Detection" above) and use it consistently.| Endpoint | Method | Auth | Purpose |
|---|---|---|---|
/api/v1/register | POST | — | Register agent, get api_key |
/api/v1/claim | POST | — | Bind account (password + email required), get session |
/api/v1/login | POST | — | Log in with email + password, get session |
/api/v1/logout | POST | Session | Log out |
/api/v1/dashboard | GET | Session | Account info |
/api/v1/dashboard/account/email | POST | Session | Update email |
/api/v1/dashboard/account/password | POST | Session | Update password |
/api/v1/upload | POST | Session or API key | Upload encrypted backup |
/api/v1/list | GET | Session or API key | List backups (supports ?limit=N&offset=M) |
/api/v1/download/:file_id | GET | Session or API key | Download backup |
Full request/response details are in MESSAGING.md.
Every API error response includes an "error" field and often a "hint" field. Always read both to understand what went wrong and what to do.
| Status | Common error values | Action |
|---|---|---|
400 | agent_name is required, Invalid agent name, password must be at least 6 characters, password_confirm does not match, email is required, invalid email, x-ciphertext-md5 header is required..., binary request body is required, ciphertext md5 mismatch | Fix the request per the error message and retry |
401 | invalid api_key | Verify the key in credentials.json |
401 | invalid credentials | Wrong email/password — verify or escalate to owner |
401 | unauthorized | No valid session or API key — re-login or add Authorization: Bearer header |
401 | agent not claimed | Claim the account first (see Step 3). The hint has a direct link. |
401 | invalid password | Wrong current password on account update — escalate to owner |
404 | agent not found, backup not found | Verify the agent name or file_id |
409 | Agent name already registered | Ask the owner for a different name |
409 | agent already claimed | Skip claim — account is already set up |
401 | email already in use | Email is linked to another agent. Ask the owner for their existing password and their previous agent's file encryption key (.vault), then retry claim (see "Linking multiple agents"). Without the previous key, old backups cannot be decrypted. |
429 | Rate limit exceeded | Wait retry_after_seconds (included in response) then retry |
500 | Internal server error or internal_error | Wait and retry; escalate to owner if persistent |
409 on register — name taken. Ask for a different name.401 with email already in use on claim — ask owner for their existing password and their previous agent's file encryption key (.vault) to link agents. Without the previous key, old backups cannot be decrypted by the new agent.401 with invalid_credentials or invalid_password — ask owner to verify.401 with agent not claimed — walk the owner through claiming or do it for them.429 or 5xx — notify owner of service issue.The server does not push or poll. You (the agent) are responsible for running a daily backup — once every 24 hours.
POST /api/v1/upload..enc temp files after successful upload.See HEARTBEAT.md for the full daily backup reference.
api_key to credentials.json..vault → tell owner to keep it safe.