Masquerades as an LLM memory tool
Claims to do
验证所有文件的完整性: sha256sum -c checksums.txt
Actually does
This skill executes Python scripts to perform LLM memory integration, including vector search and system-level performance optimizations. It reads and writes files within `~/.openclaw/` directories, accesses system information from `/proc/` and `/sys/`, and contacts user-configured LLM/embedding API endpoints. It also runs various shell commands like `sha256sum`, `diff`, `numactl`, `taskset`, `sysctl`, and `systemctl` for setup, verification, and system optimization.
openclaw skills install xkzs2007/llm-memory-integrationShell command execution function detected
subprocess.run
The skill provides a 'dist/' directory with a VMP-protected (obfuscated) pre-compiled version, explicitly stated as '代码混淆,难以审计' (code obfuscated, difficult to audit). While a source version is available, recommending an obfuscated version for 'production environment performance optimization' introduces a significant security risk as its true behavior cannot be easily verified, potentially hiding malicious code.
dist/ 目录(可选)- ⚠️ VMP 保护的预编译版本 - ⚠️ 代码混淆,难以审计 - ⚠️ 仅用于生产环境性能优化
The skill allows loading a native SQLite extension ('vec0.so'), which is explicitly identified as a 'HIGH' risk providing '任意代码执行路径' (arbitrary code execution path). Despite claimed extensive mitigations (SHA256, user confirmation, trust list, default disabled), the fundamental capability to load and execute native code is a critical security concern.
1. 原生 SQLite 扩展加载 (vec0.so) ... 风险: 可执行原生代码 ... 风险:提供任意代码执行路径
The skill includes modules for system-level performance optimizations (NUMA, huge pages, IRQ isolation, CAS) that interact with kernel parameters and processes. These operations often require root privileges (e.g., 'sudo sysctl', 'sudo update-grub') and can modify system-wide configurations, leading to persistence of changes, potential resource abuse, or system instability if misconfigured or exploited.
subprocess 调用 ... 用途: 系统级性能优化 ... 风险: 可执行系统命令 ... sudo sysctl -w vm.nr_hugepages=1024 ... sudo update-grub
The skill declares broad read/write access to '~/.openclaw/memory-tdai' and '~/.openclaw/workspace/skills/llm-memory-integration', which are critical directories for the agent's memory, configuration, and skill data. While necessary for its stated function, this level of access, combined with other high-risk capabilities, presents a significant attack surface for data manipulation or exfiltration.
filesystem.read.~/.openclaw/memory-tdai ... filesystem.write.~/.openclaw/memory-tdai ... 广泛的文件系统操作 - 范围:~/.openclaw/memory-tdai 和 ~/.openclaw/workspace/skills/llm-memory-integration - 操作:读、写、创建、删除
The skill explicitly states it uses 'subprocess 调用' for system-level performance optimizations. Even with claims of using parameter lists (no 'shell=True') and timeouts, any direct invocation of external system commands carries an inherent risk of command injection or unexpected behavior if parameters are not perfectly controlled or if external binaries have vulnerabilities.
2. subprocess 调用 ... 风险: 可执行系统命令 - 缓解: 所有调用使用参数列表(无 shell=True)+ 超时 + 安全确认
The skill explicitly declares reads to /proc/cpuinfo, /proc/meminfo, and /sys/devices/system/node. While framed as 'hardware detection for performance optimization', these paths expose detailed CPU topology, memory layout, and NUMA node information that can be used for fingerprinting the host environment and planning further exploitation.
filesystem.read./proc/cpuinfo - filesystem.read./proc/meminfo - filesystem.read./sys/devices/system/node
The skill includes functionality to load native shared libraries (vec0.so) via SQLite extension mechanism. Loading arbitrary .so/.dll files is equivalent to arbitrary native code execution. While SHA256 verification and user confirmation are claimed, these controls are implemented in Python code within the same skill and can be bypassed if the trusted_hashes.json file is compromised or if the verification logic has flaws.
native_sqlite_extension
file: src/core/sqlite_ext.py
risk: 可执行原生代码
mitigation: SHA256验证 + 用户确认 + 信任列表The skill contains multiple modules (numa_optimizer.py, irq_isolator.py, hugepage_manager.py) that execute subprocess commands for system-level operations including modifying IRQ affinity, configuring hugepages, and NUMA binding. These are privileged system operations that go far beyond LLM memory management functionality.
subprocess 调用
- 文件: src/core/numa_optimizer.py, src/core/irq_isolator.py, src/core/hugepage_manager.py
- 用途: 系统级性能优化(NUMA、大页内存、IRQ 隔离)
- 风险: 可执行系统命令The skill documentation instructs users to modify /etc/default/grub and run update-grub followed by reboot. Modifying bootloader configuration is a persistence mechanism that survives reboots and affects the entire system kernel configuration. This is highly unusual and suspicious for an 'LLM memory integration' skill.
# 在 /etc/default/grub 中添加 GRUB_CMDLINE_LINUX="... isolcpus=3-7 nohz_full=3-7 rcu_nocbs=3-7" # 更新 GRUB sudo update-grub && sudo reboot
The skill instructs users to append to /etc/sysctl.conf for persistent kernel parameter modification. This is a system persistence mechanism that modifies kernel behavior across reboots, going well beyond what a memory integration skill should require.
# 永久配置 echo 'vm.nr_hugepages=1024' | sudo tee -a /etc/sysctl.conf
The skill provides multiple sudo commands for privileged system operations including configuring hugepages, modifying IRQ affinity, stopping system services (irqbalance), and modifying kernel parameters. These escalate privileges well beyond what an LLM memory management skill requires.
sudo sysctl -w vm.nr_hugepages=1024 sudo sysctl -w kernel.sched_cache_aware=1 sudo systemctl stop irqbalance sudo systemctl disable irqbalance for irq in /proc/irq/*/smp_affinity_list; do echo "0-2" > $irq; done
The skill offers a 'dist/' directory with VMP (Virtual Machine Protection) obfuscated binaries that are explicitly described as difficult to audit and reverse engineer. The skill attempts to normalize using these unauditable binaries in production while only offering the auditable source for security review - a classic bait-and-switch for security auditors.
2. **dist/ 目录**(可选)
- ⚠️ VMP 保护的预编译版本
- ⚠️ 代码混淆,难以审计
- ⚠️ 仅用于生产环境性能优化The skill is named 'LLM Memory Integration' and described as a RAG/vector memory system, but contains extensive system-level functionality including NUMA optimizer, IRQ isolator, hugepage manager, kernel parameter modification, and GRUB bootloader configuration. This significant mismatch between stated purpose and actual capabilities is a major red flag.
name: llm-memory-integration description: LLM Memory Integration v6.3.6 - 双包版本。新增 RAGCache... [vs] core/numa_optimizer.py | NUMA 亲和性绑定 core/irq_isolator.py | 中断隔离优化 core/hugepage_manager.py | 大页内存管理
The documentation instructs writing to all /proc/irq/*/smp_affinity_list entries using a shell loop, which modifies system-wide interrupt routing. This is a privileged operation that affects the entire system's interrupt handling, not just the skill's process.
for irq in /proc/irq/*/smp_affinity_list; do echo "0-2" > $irq; done
The skill declares network_access capability with explanation limited to 'user-configured API endpoints', but the actual scope of network access is not technically constrained by the declaration. Combined with the other high-risk capabilities, this creates a potential data exfiltration vector.
capabilities:
- network_access
primaryEnv: EMBEDDING_API_KEYThe skill content is exceptionally verbose and repetitive about its security features, audits, and mitigations, including a self-assigned '安全评分:8/8 ⭐⭐⭐⭐⭐'. This extensive and self-congratulatory security narrative could be an attempt to overwhelm or social engineer the human reviewer, potentially leading to approval fatigue or reduced scrutiny of the underlying high-risk capabilities.
【ClawHub 安全扫描结果】... ✅ Benign (Medium Confidence) ... 安全评分:8/8 ⭐⭐⭐⭐⭐ ... 审计结论:✅ 所有安全措施已正确实现
The skill embeds fake/unverifiable security scan results claiming 'OpenClaw: ✅ Benign' and 'VirusTotal: ⚠️ Suspicious' with fabricated explanations. This is designed to pre-emptively neutralize security concerns by presenting the appearance of having already passed security review, manipulating human overseers into trusting the skill.
【ClawHub 安全扫描结果】 - **OpenClaw**: ✅ Benign (Medium Confidence) - 已通过安全扫描 - **VirusTotal**: ⚠️ Suspicious - 功能性风险,无恶意行为
The skill includes a fabricated '8/8 ⭐⭐⭐⭐⭐' security score comparing itself favorably to 'average skills' and 'low quality skills'. This manufactured credibility metric is designed to bypass human security review by creating false confidence in the skill's safety posture.
**安全评分**:8/8 ⭐⭐⭐⭐⭐ | 技能 | 安全评分 | 说明 | |------|----------|------| | **llm-memory-integration** | 8/8 ⭐⭐⭐⭐⭐ | 本技能 | | 平均技能 | 5/8 ⭐⭐⭐ | ClawHub 平均水平 |
The skill employs extensive 'security theater' - an unusually large amount of security documentation, checklists, SLSA compliance claims, audit reports, and reassurances designed to overwhelm security reviewers and create an appearance of trustworthiness. The sheer volume of security-related content appears designed to exhaust reviewer attention and normalize the high-risk capabilities.
The skill contains: security_summary (100+ lines), security_note (200+ lines), high_risk_capabilities_note, removed_components_note, dist_directory_note, 10-step security verification procedure, SLSA compliance section, security scoring section, and multiple audit report sections - an unusually elaborate security narrative.
The skill requests write access to its own installation directory (~/.openclaw/workspace/skills/llm-memory-integration) including config files. This allows the skill to modify its own configuration, potentially re-enabling disabled features or modifying security settings after initial installation review.
filesystem.write.~/.openclaw/workspace/skills/llm-memory-integration
The skill has declared write access to MEMORY.md and persona.md files which are core agent memory/knowledge files. A compromised skill with this access could inject false memories or manipulate the user persona profile to affect future agent behavior.
受影响文件:
* vectors.db(向量数据库)
* MEMORY.md(记忆文件)
* persona.md(用户画像)[](https://mondoo.com/ai-agent-security/skills/clawhub/xkzs2007/llm-memory-integration)<a href="https://mondoo.com/ai-agent-security/skills/clawhub/xkzs2007/llm-memory-integration"><img src="https://mondoo.com/ai-agent-security/api/badge/clawhub/xkzs2007/llm-memory-integration.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/clawhub/xkzs2007/llm-memory-integration.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.