Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Soul Dreaming

v1.0.0

Progressive memory management with categorized files, indexed retrieval, and survival-merge evolution. Prevents AI amnesia after context compaction. Activate...

0· 0·0 current·0 all-time
byyissor@xuexian1211
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (progressive memory management) aligns with the instructions to read/write categorized memory files and run promotion/archival cycles. However the SKILL.md includes examples that invoke external tools (qmd, proxychains4) and recommends capturing 'credential location' and other security-relevant items; those capabilities expand the operational footprint beyond a passive memory indexer and are not declared in requirements.
!
Instruction Scope
Runtime instructions tell the agent to read/write and delete files under workspace/memory, rebuild INDEX.md, promote/archive entries, and to immediately log decisions, context anchors, and 'security-relevant finding or credential location.' This explicitly encourages the agent to collect and persist sensitive data (credentials, config values, file paths). The skill does not limit what may be captured (e.g., it does not instruct sanitization, redaction, or encryption), increasing the risk that secrets or PII could be written to disk.
Install Mechanism
No install spec and no code files (instruction-only) — lowest technical risk. But SKILL.md examples invoke external CLI tools (qmd, proxychains4) and show shell commands; those tools are not listed under required binaries. This mismatch is a minor incoherence: the skill assumes availability of utilities it doesn't declare.
!
Credentials
The skill declares no required environment variables or credentials (good), but repeatedly instructs capturing env/config values and 'credential location' in memory files. Asking to persist credential locations without constraints is disproportionate because it creates an easy path for sensitive data to be stored in plain files accessible to the agent or other skills. The skill's own metadata does not justify that level of secret-handling.
Persistence & Privilege
always:false (good). Autonomous invocation is allowed (platform default) — combined with the skill's instructions to persist session data, this increases the blast radius (the agent could autonomously write sensitive entries). The skill manages files only under workspace/memory and does not request system-wide config modifications, but its archival/deletion rules (e.g., deleting journals older than 14 days) are powerful and should be applied only to a well-scoped directory under user control.
What to consider before installing
This skill appears to implement a coherent memory-management system, but be careful before enabling it. Key concerns: - It explicitly encourages saving 'security-relevant findings' and 'credential locations' to workspace memory files; consider that these files could contain secrets or PII and may be read by other skills or processes. If you install it, review and control what the agent is allowed to persist. - The SKILL.md demonstrates use of external tools (qmd, proxychains4) but the skill doesn't declare them; either ensure those tools are available and secure or disallow commands that call them. - The skill will perform file operations (create, promote, archive, delete) inside workspace/memory. Confirm that the workspace path is isolated and that you have backups of any important data before allowing the agent to run the REM/Deep Sleep cycles. Practical precautions: - Restrict the skill's writable directory to a sandboxed workspace/memory path and do not allow it access to broader filesystem paths. - Add a policy or filter so the agent redacts or refuses to persist secrets (API keys, passwords, tokens). You can modify the templates to include an automatic 'REDACTED' step for any suspected secret patterns. - Audit memory files regularly and consider encrypting sensitive entries or storing only pointers (not raw secrets). - If you are uncomfortable with autonomous writes, disable autonomous invocation for this skill or require explicit user consent before any write/delete action. If you want a safer assessment, provide: (1) whether the runtime agent will run with access to other workspace folders or system folders, and (2) whether you have a policy to block writing of secrets — with that info I can give higher-confidence guidance.

Like a lobster shell, security has layers — review code before you run it.

amnesiavk970nkvzc3z0k0af3qefvfjqqn84dndtcompactionvk970nkvzc3z0k0af3qefvfjqqn84dndtdreamingvk970nkvzc3z0k0af3qefvfjqqn84dndtlatestvk970nkvzc3z0k0af3qefvfjqqn84dndtmemoryvk970nkvzc3z0k0af3qefvfjqqn84dndtpreventionvk970nkvzc3z0k0af3qefvfjqqn84dndt

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments