Telnyx Rag

ReviewAudited by ClawScan on May 10, 2026.

Overview

This appears to be a legitimate Telnyx-backed memory search skill, but it will upload selected workspace files to Telnyx and should be configured carefully.

Install only if you are comfortable uploading the configured workspace files to Telnyx. Before running setup or sync, review config.json, choose the intended bucket, add exclusions for secrets or private files, and keep TELNYX_API_KEY/.env protected and trusted.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your selected local memory, knowledge, docs, and skill content may be stored and reused as RAG context through Telnyx.

Why it was flagged

The skill intentionally sends selected workspace content into a cloud-backed embedding/search workflow, which is purpose-aligned but can include private memory or agent context.

Skill content
- **Indexes** your workspace files (MEMORY.md, memory/*.md, knowledge/, skills/)
- **Embeds** content automatically using Telnyx AI
Recommendation

Review config.json patterns and exclusions before syncing, and avoid indexing files that contain secrets, private user data, or instructions you do not want reused.

What this means

Running setup can upload configured workspace files and start Telnyx embedding work.

Why it was flagged

Full setup performs cloud/storage actions, including bucket creation or verification, file sync, and embedding trigger. These are expected for the skill but are more than a passive install check.

Skill content
python3 "$SCRIPT_DIR/sync.py" --create-bucket --quiet ... python3 "$SCRIPT_DIR/sync.py" --quiet ... python3 "$SCRIPT_DIR/sync.py" --embed --quiet
Recommendation

Run setup only after confirming the bucket name and file patterns, and use validation/check modes only with a key you are comfortable testing.

What this means

If the .env file is untrusted or modified, running setup could execute unintended shell commands.

Why it was flagged

The setup script loads .env by sourcing it as shell, so a tampered .env could execute shell syntax instead of merely providing TELNYX_API_KEY.

Skill content
set -a  # Enable export of all variables
source "$SCRIPT_DIR/.env"
set +a
Recommendation

Create .env yourself, keep it to a simple TELNYX_API_KEY assignment, and do not run setup with an untrusted .env file.

What this means

Anyone who obtains the key may be able to access or mutate Telnyx resources allowed by that key.

Why it was flagged

The skill uses a Telnyx bearer API key for provider calls, which is expected for this integration but grants access according to that key's Telnyx permissions.

Skill content
-H "Authorization: Bearer $TELNYX_API_KEY"
Recommendation

Use a suitably scoped Telnyx key if available, protect .env permissions, and rotate the key if it may have been exposed.

What this means

Files could be uploaded to a different Telnyx bucket than the user expected if they follow the default setup path without checking output.

Why it was flagged

The setup script defaults to openclaw-memory and rewrites config.json; users should verify this because the quick-start text says setup uses the bucket from config.json.

Skill content
BUCKET="${1:-openclaw-memory}" ... config['bucket'] = '$BUCKET'
Recommendation

Pass an explicit bucket name or confirm config.json after setup before syncing sensitive content.