Back to skill
Skillv1.0.0

ClawScan security

OpenViking记忆适配器 · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 5, 2026, 8:37 AM
Verdict
benign
Confidence
medium
Model
gpt-5-mini
Summary
This package appears to be a local OpenViking memory adapter that reads and summarizes the agent's workspace files and writes its own memory artifacts — its behavior is coherent with the stated purpose, but I have medium confidence because part of the code was truncated and should be inspected for network/exfiltration logic before use.
Guidance
This skill looks coherent for a local memory adapter, but before installing: (1) review the complete server.py for any network calls, remote endpoints, or code that sends memory content off-machine (the provided file was truncated); (2) confirm whether requests/dotenv are actually used and why; (3) remember it will read your agent's memory files (MEMORY.md, USER.md, SOUL.md, memory/*.md) and will write into ~/.openclaw/workspace/memory_viking — back up any sensitive data first; (4) if you run it, prefer executing in a sandboxed environment first to confirm no unexpected outbound traffic; (5) verify how the marketplace handles the stated per-call payment (0.5 USDT) and whether any credentials/payment hooks are required.

Review Dimensions

Purpose & Capability
okName/description (OpenViking memory adapter) match what the package does: reading agent memory files from ~/.openclaw/workspace, extracting key info, producing L0/L1/L2 artifacts, and exposing tools for analysis and search. The declared artifacts and tool names align with the code and skill.json.
Instruction Scope
okSKILL.md describes local tool calls (openclaw tools call ...) and the server.py implements reading/writing files under ~/.openclaw/workspace and producing summaries. The instructions do not ask for unrelated system files or extra credentials. The code does read potentially sensitive local memory files (MEMORY.md, memory/*.md, USER.md, SOUL.md) — that is expected for a memory adapter but is also precisely the sensitive data surface the user should be aware of.
Install Mechanism
okNo install spec is provided (instruction-only from registry perspective) and the code is executed via MCP (python3 server.py). requirements.txt lists requests and python-dotenv but there is no external installer or downloaded binaries. This is low-install risk; however you should ensure dependencies are installed from trusted sources.
Credentials
okThe skill declares no required env vars, no primary credential, and no config paths beyond ~/.openclaw/workspace which it uses for reading/writing memory — these are proportional to a memory adapter. requirements.txt includes python-dotenv and requests (possible network usage) though the visible code does not access external env variables; that mismatch is minor but worth verifying.
Persistence & Privilege
okSkill is not always:true and does not request elevated system privileges. It writes its own files under ~/.openclaw/workspace/memory_viking (expected). Autonomous invocation is allowed (platform default) but not combined here with other high-risk factors.