Lobster Fork Mode
v1.0.0Fork子Agent模式 — 子Agent继承父上下文。当需要子Agent了解父会话的关键上下文时自动激活。
⭐ 0· 33·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's metadata declares sessions_spawn, read, and memory_search capabilities which are precisely what a 'forked subagent inheriting parent context' feature needs. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
SKILL.md explicitly instructs collecting parent task goals, file paths, code snippets, decision history, and user preferences (from MEMORY.md) and injecting them into the child agent. That is coherent with the purpose but means the subagent will receive potentially sensitive context; the instructions themselves do not attempt to access anything beyond the declared capabilities.
Install Mechanism
Instruction-only skill with no install spec and no code files — minimal attack surface from installation.
Credentials
No environment variables, credentials, or external config are requested. The declared read and memory_search capabilities justify the data the skill asks to access.
Persistence & Privilege
always is false and the skill is user-invocable and allowed to be invoked autonomously (platform default). The skill does not request permanent system presence or modify other skills' configs.
Assessment
This skill appears internally consistent, but it explicitly recommends copying parent-session context (including MEMORY.md entries, code snippets, file paths, and decision history) into spawned subagents. Before installing or using it: 1) Review what your agent stores in MEMORY.md and other session memories — remove or redact secrets (API keys, passwords, PII) that should not be shared with child agents. 2) Ensure the agent's tool whitelist and permissions are correctly configured so forked subagents cannot access additional tools or external endpoints. 3) Limit which files and how much code are injected (follow the documented truncation rules). 4) Test in a safe environment with non-sensitive data to verify behavior. If you need stricter controls (e.g., preventing any memory sharing), do not enable this skill or modify the fork template to sanitize or omit sensitive fields.Like a lobster shell, security has layers — review code before you run it.
latestvk97754jy2yc7adk237m73h2dex8474ya
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
