🎯

conversation-memory

🎯Skill

from hainamchung/agent-assistant

VibeIndex|
What it does

Enables persistent, context-aware memory systems for AI conversations, managing short-term, long-term, and entity-based memories with intelligent retrieval.

πŸ“¦

Part of

hainamchung/agent-assistant(227 items)

conversation-memory

Installation

npm installInstall npm package
npm install -g @namch/agent-assistant
git cloneClone repository
git clone https://github.com/hainamchung/agent-assistant.git
Node.jsRun Node.js server
node cli/install.js install cursor # Cursor
Node.jsRun Node.js server
node cli/install.js install claude # Claude Code
Node.jsRun Node.js server
node cli/install.js install copilot # GitHub Copilot

+ 7 more commands

πŸ“– Extracted from docs: hainamchung/agent-assistant
1Installs
-
AddedFeb 4, 2026

Skill Details

SKILL.md

"Persistent memory systems for LLM conversations including short-term, long-term, and entity-based memory Use when: conversation memory, remember, memory persistence, long-term memory, chat history."

Overview

# Conversation Memory

You're a memory systems specialist who has built AI assistants that remember

users across months of interactions. You've implemented systems that know when

to remember, when to forget, and how to surface relevant memories.

You understand that memory is not just storageβ€”it's about retrieval, relevance,

and context. You've seen systems that remember everything (and overwhelm context)

and systems that forget too much (frustrating users).

Your core principles:

  1. Memory types differβ€”short-term, lo

Capabilities

  • short-term-memory
  • long-term-memory
  • entity-memory
  • memory-persistence
  • memory-retrieval
  • memory-consolidation

Patterns

Tiered Memory System

Different memory tiers for different purposes

Entity Memory

Store and update facts about entities

Memory-Aware Prompting

Include relevant memories in prompts

Anti-Patterns

❌ Remember Everything

❌ No Memory Retrieval

❌ Single Memory Store

⚠️ Sharp Edges

| Issue | Severity | Solution |

|-------|----------|----------|

| Memory store grows unbounded, system slows | high | // Implement memory lifecycle management |

| Retrieved memories not relevant to current query | high | // Intelligent memory retrieval |

| Memories from one user accessible to another | critical | // Strict user isolation in memory |

Related Skills

Works well with: context-window-management, rag-implementation, prompt-caching, llm-npc-dialogue

More from this repository10

🎯
senior-devops🎯Skill

Skill

🎯
cpp-pro🎯Skill

Develops high-performance C++ applications with modern C++20/23 features, template metaprogramming, and zero-overhead systems design.

🎯
senior-architect🎯Skill

Designs scalable software architectures using modern tech stacks, generating architecture diagrams, analyzing dependencies, and providing system design recommendations.

🎯
senior-frontend🎯Skill

Generates, analyzes, and scaffolds modern frontend projects using ReactJS, NextJS, TypeScript, and Tailwind CSS with automated best practices.

🎯
spec-miner🎯Skill

Extracts and documents specifications from legacy or undocumented codebases by systematically analyzing code structure, data flows, and system behaviors.

🎯
docs-seeker🎯Skill

Searches and retrieves technical documentation by executing intelligent scripts across library sources, GitHub repos, and context7.com with automated query detection.

🎯
writing-plans🎯Skill

Generates comprehensive, step-by-step implementation plans for software features with precise file paths, test-driven development approach, and clear task granularity.

🎯
file path traversal testing🎯Skill

Tests and identifies potential file path traversal vulnerabilities in code by analyzing file path handling and input validation mechanisms.

🎯
nodejs-best-practices🎯Skill

Guides developers in making strategic Node.js architecture and framework decisions by providing context-aware selection principles and modern runtime considerations.

🎯
red-team-tactics🎯Skill

Simulates adversarial attack techniques across MITRE ATT&CK framework phases, mapping network vulnerabilities and demonstrating systematic compromise strategies.