Session Recover
v1.0.0短期记忆恢复技能。用于快速回顾当前 session 或上一个 session 的完整内容。适用于:想知道"这次 session 聊了什么"、session 被意外重置后需要恢复上下文、或想提取对话精华。
⭐ 0· 72·0 current·0 all-time
by@axelhu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the included artifacts: SKILL.md documents locating and parsing local OpenClaw session JSONL files and the repo includes a dedicated parse_session.py that implements that parsing. No unrelated binaries, env vars, or service credentials are requested.
Instruction Scope
Runtime instructions tell the agent to list and read local session archive files (under ~/.openclaw/agents/.../sessions), call sessions_list, and run the included Python parser. Those actions are necessary for restoring session content. The instructions do rely on local commands (session_status, sessions_list) and specific paths (agents/main/sessions), which is expected but means the skill assumes a particular agent layout.
Install Mechanism
No install spec is provided (instruction-only plus a small script). Nothing is downloaded or written to disk by an installer, reducing risk.
Credentials
The skill declares no required environment variables, credentials, or config paths beyond reading local session archive files. That is proportionate to the stated purpose.
Persistence & Privilege
always is false and the skill does not request persistent platform privileges or modify other skills. It is user-invocable and can run when invoked, which is appropriate.
Assessment
This skill reads local OpenClaw session archive files and prints extracted messages. The included parser is local and contains no network or credential-siphoning code, but be aware: (1) it will output conversation content you may consider sensitive—only run it if you trust the skill source and the runtime environment; (2) the SKILL.md uses shell commands and hard-coded agent paths (e.g., ~/.openclaw/agents/main/sessions and session_status/sessions_list) — confirm those commands and paths exist in your environment; (3) the parser accepts any file path you provide, so do not point it at unrelated sensitive files. If you have doubts, inspect parse_session.py locally before running or run it in a restricted environment. If you want higher assurance, request the publisher/source or a cryptographic release channel for the skill.Like a lobster shell, security has layers — review code before you run it.
latestvk975p2g47pkn85j4z64104ee5183p1g9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
