Skip to content

fix: memory shows unavailable on openclaw 2026.3.28#38

Merged
Dhravya merged 3 commits intomainfrom
fix/openclaw-compat-2026.3.28
Mar 31, 2026
Merged

fix: memory shows unavailable on openclaw 2026.3.28#38
Dhravya merged 3 commits intomainfrom
fix/openclaw-compat-2026.3.28

Conversation

@Prasanna721
Copy link
Copy Markdown
Member

@Prasanna721 Prasanna721 commented Mar 31, 2026

openclaw 2026.3.28 added a formal memory plugin contract (registerMemoryRuntime) that we weren't calling. plugin loaded fine but openclaw reported memory as unavailable.

what changed:

  1. added runtime.ts registers our plugin as the active memory backend via registerMemoryRuntime, so openclaw stops saying unavailable
  2. sqlite marker file openclaw's status check bails if ~/.openclaw/memory/main.sqlite doesn't exist (designed for local memory plugins). we create an empty one at module load so the check passes through to our runtime
  3. prompt section tells the agent "memory is cloud-based, don't try to read MEMORY.md or memory/*.md"
  4. strip sender metadata openclaw wraps user messages with Sender (untrusted metadata) json blocks. we now strip those before sending to supermemory api (matched their own strip-inbound-meta.ts logic)
  5. new session optimization on session start (turn 0), call getProfile() without query param instead of searching against the startup system prompt
  6. detectCategory regex fix/is|are/ was matching substrings in every word, added word boundaries

tested on openclaw 2026.3.28, openclaw status now shows 0 files · 0 chunks · plugin openclaw-supermemory instead of unavailable.

1. register memory runtime so openclaw recognizes us as active backend
2. create sqlite marker file so status check doesn't bail early
3. add prompt section telling agent not to read local memory files
4. strip openclaw sender metadata before sending to supermemory api
5. skip query param on new session for faster profile load
6. fix word boundary bug in detectCategory regexes
@socket-security
Copy link
Copy Markdown

socket-security bot commented Mar 31, 2026

No dependency changes detected. Learn more about Socket for GitHub.

👍 No dependency changes detected in pull request

@Dhravya Dhravya merged commit 3831d81 into main Mar 31, 2026
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants