openclaw-mem
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands for its core functionality, including installation via
pip install openclaw-mem, workspace initialization withopenclaw-mem init, and managing memory through various CLI commands. - [EXTERNAL_DOWNLOADS]: Fetches the
openclaw-mempackage from the Python Package Index and automatically downloads a ~90MB embedding model during the first execution to enable offline functionality. - [PROMPT_INJECTION]: As a RAG (Retrieval-Augmented Generation) tool, the skill processes potentially untrusted data from session transcripts and external markdown files, creating a surface for indirect prompt injection.
- Ingestion points: Untrusted data is ingested from session transcripts (via
auto-capture) and local markdown files in the project workspace (viaindex). - Boundary markers: The skill implements an "Injection Defense" scanner and a "Sanitizer" to process indexed content.
- Capability inventory: The system performs semantic searches to provide context to the agent and executes observations capture; no dangerous dynamic code execution was identified in the provided scripts.
- Sanitization: The skill features a specific
brain-checkutility designed to detect and remediate injection patterns within the stored memory files.
Audit Metadata