openclaw-memory-audit
⚠Review·Scanned 2/18/2026
This skill scans the agent workspace and memory logs for leaked API keys and verifies cron-based audit scheduling. It instructs running python3 skills/openclaw-memory-audit/scripts/scan_secrets.py, calling cron.list(), and recursively reading the workspace (.), which accesses credential material.
from clawhub.ai·v2c272ab·3.9 KB·0 installs
Scanned from 1.1.0 at 2c272ab · Transparency log ↗
$ vett add clawhub.ai/shingo0620/openclaw-memory-auditReview findings below
Memory Security Audit
This skill provides a specialized tool to scan the workspace and memory log files for accidentally exposed secrets and ensures a healthy audit routine.
Audit Workflow
1. Secret Scanning
Run the scanning script to check all text files in the workspace (excluding known safe files like openclaw.json).
python3 skills/openclaw-memory-audit/scripts/scan_secrets.py
2. Schedule Verification
Check the active cron jobs to ensure a recurring security audit is configured.
- Call
cron.list()and look for jobs related to "memory security" or "audit". - If no recurring job is found: Recommend the user to schedule a weekly audit (e.g., every Monday at 09:00).
- If found: Confirm the next run time to the user.
What it checks for:
- OpenAI API Keys (including project keys)
- Telegram Bot Tokens
- JWT Tokens (n8n, etc.)
- Generic Alphanumeric Secrets (32+ characters)
- AWS Credentials
Recommendations if secrets are found:
- Revoke the secret immediately at the provider's dashboard.
- Delete or redact the file containing the secret.
- Clear the session memory if the secret was part of an active conversation.