context-anchorRecover from context compaction by scanning memory files and surfacing where you left off. Use when waking up fresh, after compaction, or when you feel lost about what you were doing.
Install via ClawdBot CLI:
clawdbot install Boscoeuk/context-anchorHelps agents recover context after compaction by scanning memory files and generating a "here's where you are" briefing.
Context compaction loses memory. Files survive. But after waking up fresh, you need to:
This skill automates that recovery.
# Full briefing (default)
./scripts/anchor.sh
# Just show current task
./scripts/anchor.sh --task
# Just show active context files
./scripts/anchor.sh --active
# Just show recent decisions
./scripts/anchor.sh --decisions
# Show open loops / questions
./scripts/anchor.sh --loops
# Scan specific number of days back
./scripts/anchor.sh --days 3
| Source | What It Extracts |
|--------|------------------|
| memory/current-task.md | Current task status, blockers, next steps |
| memory/YYYY-MM-DD.md | Recent daily logs (last 2 days by default) |
| context/active/*.md | In-progress task files |
| Daily logs | Decisions (lines with "Decision:", "Decided:", "β ") |
| Daily logs | Open loops (lines with "?", "TODO:", "Blocker:", "Need to") |
The script outputs a structured briefing:
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
CONTEXT ANCHOR
Where You Left Off
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
π CURRENT TASK
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[Contents of memory/current-task.md or "No current task set"]
π ACTIVE CONTEXT FILES
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β’ context/active/project-name.md (updated 2h ago)
ββ First line preview...
π― RECENT DECISIONS (last 2 days)
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[2026-01-30] Decision: Use Cloudflare Pages for hosting
[2026-01-30] β
Completed email capture setup
β OPEN LOOPS
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[2026-01-30] Need to enable SFTP on NAS
[2026-01-30] TODO: Create Product Hunt account
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Add to your "Every Session" routine:
## Every Session
Before doing anything else:
1. Run `./skills/context-anchor/scripts/anchor.sh` for orientation
2. Read `SOUL.md` β this is who you are
3. Read `USER.md` β this is who you're helping
...
Or use it manually when you feel lost about context.
WORKSPACE=/path/to/workspace ./scripts/anchor.sh
./scripts/anchor.sh --days 5 # Scan 5 days back
Pure bash. Uses only:
find, grep, head, tail, date, statAI Usage Analysis
Analysis is being generated⦠refresh in a few seconds.
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope, and suspicious patterns.
Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
Security check for ClawHub skills powered by Koi. Query the Clawdex API before installing any skill to verify it's safe.
Scan Clawdbot and MCP skills for malware, spyware, crypto-miners, and malicious code patterns before you install them. Security audit tool that detects data exfiltration, system modification attempts, backdoors, and obfuscation techniques.