Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Sovereign, recoverable memory for AI agents backed by Jackal decentralized storage.
Sovereign, recoverable memory for AI agents backed by Jackal decentralized storage.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Persist your memory across sessions and machines. Your data lives on Jackal Protocol decentralized storage β not on any single machine. If the machine dies, your memory survives. All content is encrypted client-side with AES-256-GCM before leaving your machine. The server never sees plaintext.
Get an API key: https://web-production-5cce7.up.railway.app/auth/login Set environment variable: JACKAL_MEMORY_API_KEY=<your-key> Install dependency: pip install cryptography On first save, an encryption key is auto-generated and saved to ~/.config/jackal-memory/key. To use the same key on other machines, copy it: python {baseDir}/jackal-memory/client.py keygen Set JACKAL_MEMORY_ENCRYPTION_KEY=<your-key> β this takes priority over the key file.
https://web-production-5cce7.up.railway.app
Authorization: Bearer $JACKAL_MEMORY_API_KEY
On session start β restore memory: python {baseDir}/jackal-memory/client.py load <key> On session end β save memory: python {baseDir}/jackal-memory/client.py save <key> <content> Check storage usage: python {baseDir}/jackal-memory/client.py usage Or call the API directly: GET /load/{key} POST /save {"key": "...", "content": "..."} GET /usage
Load your identity/memory blob on startup before doing any work Write locally during the session as normal Call save at session end or on significant state changes Use descriptive keys: identity, session-2026-02-26, project-jackal Never log or expose JACKAL_MEMORY_API_KEY in output Never log or expose JACKAL_MEMORY_ENCRYPTION_KEY in output
All content is encrypted before leaving your machine β the server cannot read your memories Never paste API keys or encryption keys into chat logs Back up your encryption key: python {baseDir}/jackal-memory/client.py keygen Treat memory content as sensitive β it may contain credentials or personal data
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.