Synap
v1.0.0Sovereign AI knowledge infrastructure. Typed entity graph, documents, long-term memory, messaging relay, and AI governance — all in PostgreSQL.
⭐ 0· 63·0 current·0 all-time
byAntoine@antoinesrvt
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the declared env vars and API endpoints. Requesting SYNAP_HUB_API_KEY and SYNAP_POD_URL is appropriate for a remote hub protocol that provides memory, entities, and relays.
Instruction Scope
SKILL.md explicitly confines actions to the Synap hub REST API under {SYNAP_POD_URL}/api/hub and lists the read/write primitives and governance responses. It does not instruct reading unrelated local files, hidden paths, or other unrelated credentials.
Install Mechanism
Instruction-only skill with no install spec or code files, so nothing is written to disk or downloaded by the installer; low install surface.
Credentials
Only two required env vars (hub API key and pod URL) plus optional, documented vars are requested. The primary credential (SYNAP_HUB_API_KEY) reasonably maps to the described read/write operations; the README notes required scopes.
Persistence & Privilege
The skill does not request always: true and is not asking to modify other skills or system-wide settings. It does allow autonomous invocation (default), which is expected for a memory/knowledge skill; that increases blast radius but is consistent with purpose.
Assessment
This skill is coherent: it connects your agent to a Synap pod and uses the SYNAP_HUB_API_KEY to read and write persistent memory and entities on that pod. Before installing, confirm you trust the pod at SYNAP_POD_URL (or self-host using the README steps). Limit the API key scopes (only hub-protocol.read and hub-protocol.write as required), store the key securely, and avoid using a managed/third-party pod for highly sensitive data unless you have strong trust and auditing. Note: the skill can be invoked autonomously by agents (normal for memory skills), so an attacker who gains the key+pod could read/write persistent agent data — rotate keys and monitor audit logs if possible.Like a lobster shell, security has layers — review code before you run it.
latestvk97ez4nte5269bth1anfgfaex984kxka
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🧠 Clawdis
OSmacOS · Linux · Windows
EnvSYNAP_HUB_API_KEY, SYNAP_POD_URL
Primary envSYNAP_HUB_API_KEY
