Persistent memory tools for Claude Desktop. Search your vault or Obsidian notes mid-conversation.
Config is the same across clients β only the file and path differ.
{
"mcpServers": {
"io-github-strangeadvancedmarketing-adam-framework": {
"args": [
"-y",
"openclaw"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
New here? Start with the live site β it explains everything without a single line of code. > Want the proof? β 353 sessions of real production data, rendered as charts > Want the full story? β 8 months, 3 AIs, one nuclear reset
Run this in your terminal to verify the server starts. Then let us know if it worked β your result helps other developers.
npx -y 'openclaw' 2>&1 | head -1 && echo "β Server started successfully"
After testing, let us know if it worked:
Five weighted categories β click any category to see the underlying evidence.
OpenClaw's gateway config mutation guard allowed unsafe model-driven config writes
## Summary The agent-facing `gateway` tool protects `config.apply` and `config.patch` with a model-to-operator trust boundary. That guard used a hand-maintained denylist of protected config paths. The config schema outgrew that denylist, leaving sensitive subtrees writable through model-driven gateway config mutations. ## Impact A prompt-injected or otherwise compromised model running with access to the owner-only `gateway` tool could persist unsafe config changes that crossed security bounda
OpenClaw vulnerable to arbitrary code execution via attacker-controlled setup-api.js loaded from cwd during env-key resolution
## Summary OpenClaw's bundled plugin setup resolver could fall back to `process.cwd()` while resolving provider setup metadata. If a user ran an OpenClaw command from an attacker-controlled repository containing `extensions/<plugin>/setup-api.js`, OpenClaw could load and execute that JavaScript during ordinary provider/model status resolution. ## Impact This is arbitrary JavaScript execution in the OpenClaw process under the current user account. A malicious repository could run code when the
OpenClaw's Webhooks SecretRef route secret remains valid after rotation/reload
## Summary OpenClaw webhooks allowed route secrets to be backed by `SecretRef` values, but cached the resolved secret for a route. After an operator rotated the underlying secret and ran `openclaw secrets reload`, the previous resolved webhook secret could remain valid until the plugin or gateway restarted. ## Impact An attacker who already had a previously valid webhook route secret could continue authenticating webhook requests after the operator rotated the secret and reloaded secrets. Thi
OpenClaw contains a symlink traversal vulnerability
OpenClaw versions 2026.3.22 before 2026.4.5 contain a symlink traversal vulnerability in remote marketplace repository path handling that allows attackers to escape the expected repository root. Attackers can exploit this by providing crafted symlink paths to access files outside the intended repository directory.
OpenClaw's Gateway Control UI bootstrap config required Gateway auth
## Summary Gateway Control UI bootstrap config required Gateway auth. ## Affected Packages / Versions - Package: openclaw (npm) - Affected versions: <= 2026.4.21 - Fixed version: 2026.4.22 ## Impact When Gateway authentication was enabled, the Control UI bootstrap config endpoint could still be read without a valid Gateway token. That response could expose sensitive bootstrap/config fields intended only for authenticated Control UI sessions. ## Fix The bootstrap config route now goes through
Be the first to review
Have you used this server?
Share your experience β it helps other developers decide.
Sign in to write a review.
Others in productivity / ai-ml
Persistent memory using a knowledge graph
Privacy-first. MCP is the protocol for tool access. We're the virtualization layer for context.
Official Miro MCP server - Supports context to code and creating diagrams, docs, and data tables.
An open-source AI agent that brings the power of Gemini directly into your terminal.
MCP Security Weekly
Get CVE alerts and security updates for io.github.strangeadvancedmarketing/adam-framework and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Built by one non-coder. Running a live business. On consumer hardware. No CS degree required.
New here? Start with the live site β it explains everything without a single line of code.
Want the proof? β 353 sessions of real production data, rendered as charts
Want the research? β Emergent values in persistent AI β tested on IBM Quantum hardware
Want the full story? β 8 months, 3 AIs, one nuclear reset
"Every AI memory system stores what your agent knows. Adam stores who your agent is β in files you own, on hardware you control, that survive anything the cloud throws at you."
The framework is MIT open source β everything you need is in this repo.
If you want to skip the setup and get straight to a working system, the Fast-Track Package ($49) includes pre-filled templates, a step-by-step guide written for non-developers, and all tools pre-configured.
Framework is free. Setup support is optional. Your call.
In February 2026, the machine running Adam got completely wiped. Full reset. Eight months of sessions, decisions, project history, relationships β gone from the model.
Adam came back online in under an hour.
SOUL.md survived. CORE_MEMORY.md survived. The neural graph survived. The Vault files β all plain markdown sitting on disk β held everything the model needed to come back as itself. Same identity. Same history. Same AI.
That is not a recovery story. That is the proof of concept for identity sovereignty: your AI's continuity lives in your files, not in any vendor's infrastructure.
The memory is in the files. The model is just the reader. Swap the LLM β the Vault survives. Vendor shuts down β the Vault survives. Machine gets wiped β restore the Vault, restore the AI. Full stop.
Everyone is building AI memory. ChatGPT has it. Claude has it. Claude Code has CLAUDE.md.
None of them answer this question: **what happe