Remembering Conversations
v1.0.0Use when user asks 'how should I...' or 'what's the best approach...' after exploring code, OR when you've tried to solve something and are stuck, OR for unf...
⭐ 0· 386·8 current·9 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (remembering past conversations, searching history) aligns with the instructions and the provided MCP tools. There are no unrelated environment variables, binaries, or install steps requested.
Instruction Scope
The SKILL.md explicitly mandates dispatching a 'search-conversations' subagent and reading top results (2–5) to synthesize findings. This is in-scope for a memory/search skill, but it does mean the agent will access the user's stored conversation history (potentially including sensitive information). The MCP-TOOLS.md also documents a 'read' tool that takes absolute local archive paths, confirming the skill will surface local conversation contents.
Install Mechanism
Instruction-only skill with no install spec and no code files. Nothing is written to disk or downloaded by the skill itself.
Credentials
No environment variables, credentials, or config paths are required. The documented file-paths in MCP-TOOLS.md are relevant to the skill's purpose (conversation archive) and not an unrelated privilege escalation.
Persistence & Privilege
always is false and the skill does not request persistent system-wide configuration changes or elevated privileges. It does instruct the agent to use a subagent, which is normal for skills that perform searches.
Assessment
This skill simply tells the agent to search your episodic conversation archive and synthesize results; it does not install software or ask for credentials. Before enabling, consider whether you are comfortable with the agent reading your past conversations (they may contain secrets or private data). If concerned: (1) review or purge sensitive messages from your conversation archive, (2) confirm platform controls around episodic memory access, or (3) avoid enabling the skill. If you want tighter control, ask for a version that restricts date ranges, projects, or explicit user confirmation before each search.Like a lobster shell, security has layers — review code before you run it.
latestvk97bw8cf818baty08v86k5am3182bezm
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
