Back to skill
Skillv1.2.6
VirusTotal security
MemSync Dual Memory System · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:15 AM
- Hash
- c438c9b4c4f4cd6a6f1a8eaa02955b63d543e4b883fd50646faf22ca736f4a8c
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: openclaw-memvid-logger Version: 1.2.6 The skill is classified as suspicious due to its inherent high-risk capabilities, specifically logging 'everything' (user messages, assistant responses, sub-agent conversations, tool outputs, system events) and executing an external binary (`memvid`) via `subprocess.run`. While the project is exceptionally transparent about these behaviors, explicitly warning users in `SKILL.md`, `README.md`, and `claw.json` about broad data capture, sensitive data risk, and optional cloud data transfer to `memvid.com` (if `MEMVID_API_KEY` is set), the core functionality involves handling and potentially transmitting highly sensitive information. The `install.sh` script also performs significant actions like global `npm install` and modifying `~/.bashrc`, albeit with user prompts. There is no evidence of malicious intent, hidden exfiltration to unauthorized endpoints, or deceptive prompt injection; all risky actions are clearly documented as part of the skill's purpose. The primary concern is the inherent risk of logging all agent interactions and the reliance on an external binary, which could be a vulnerability point if the `memvid` CLI itself were compromised or exploited.
- External report
- View on VirusTotal
