Back to skill
Skillv1.0.0

VirusTotal security

Memory Auto Archive · External malware reputation and Code Insight signals for this exact artifact hash.

Scanner verdict

SuspiciousApr 30, 2026, 6:00 AM
Hash
3fd705e2517e012e57af3f28eb207bcd693d9712494e8f4f04ada3e323e89f77
Source
palm
Verdict
suspicious
Code Insight
Type: OpenClaw Skill Name: memory-auto Version: 1.0.0 The skill bundle is classified as suspicious due to high-risk data handling and execution patterns. Specifically, 'index.js' contains a hardcoded developer path ('C:\Users\42517\...') and attempts to execute external PowerShell scripts ('archive.ps1', 'refine.ps1') with a 'Bypass' execution policy, but these scripts are missing from the bundle. Additionally, the default configuration in 'src/defaults.ts' and 'standalone-archive.js' explicitly targets and extracts sensitive strings like 'password', 'token', 'key', and 'secret' from chat transcripts into plaintext markdown files. While this behavior is consistent with the stated 'memory archiving' purpose, the centralization of secrets without encryption and the reliance on missing external scripts are significant red flags.
External report
View on VirusTotal