ServicesAboutNotesContact Get in touch →
EN FR
Note

AI Personal CRM Pattern

Using an AI agent to auto-scan email and calendar for contact relationship tracking — how the pattern works, what SQLite with vector embeddings enables, and why this is the highest-risk integration to configure carefully.

Planted
automationai

The AI Personal CRM pattern uses an agent to auto-scan Gmail and Google Calendar and build contact profiles from interaction history. It addresses the follow-up failure mode in consulting relationships: contacts that go quiet because other work took priority. It also requires careful configuration due to the sensitivity of email access.

What the Pattern Does

OpenClaw is the most documented implementation. The agent auto-scans Gmail and Google Calendar and builds profiles from the interaction history it finds, with no manual entry required.

The stored data includes:

  • Contact profiles — name, organization, role (inferred from email signatures and calendar invites), interaction history
  • Interaction timeline — dates of emails sent and received, meeting dates, calendar event titles
  • Relationship health score — a composite signal based on recency (when did you last interact?) and frequency (how often do you typically interact?)

The data lives locally in SQLite. The agent stores vector embeddings of interaction summaries alongside the structured records, which enables natural-language querying over the relationship history.

Natural Language Queries Over Relationship History

The vector embedding storage means you can ask conversational questions rather than writing SQL:

  • “Who do I need to follow up with this week?”
  • “When did I last talk to someone at Decathlon?”
  • “Which prospects have gone quiet in the last month?”
  • “What was the status of the Lafuma project last time I checked in?”

The agent understands context, not just keyword matches. “Someone at Decathlon” returns results about anyone whose email or calendar record associates them with Decathlon — not just contacts who have “Decathlon” in a specific field.

This is where the pattern becomes genuinely useful rather than just a data collection exercise. A traditional CRM requires you to navigate its interface, run filtered views, and interpret results. An agent-based CRM responds to how you actually think about your relationships.

Proactive Follow-Up Nudges

The proactive element is what separates this from a passive contact log. The agent sends you daily status updates via WhatsApp or Telegram, flagging relationships that need attention:

“You haven’t checked in with Lafuma in 2 weeks.” “Your last email to PVCP was 10 days ago and they haven’t replied.” “You have a call scheduled with Decathlon on Thursday — last interaction was 3 weeks ago.”

These are exactly the things that slip through the cracks when you’re heads-down on a data migration or sprint delivery. The agent doesn’t forget. It doesn’t get absorbed in your current project. It watches the relationship timeline against the thresholds you’ve defined and nudges you when the gap widens.

The thresholds are configurable. A hot prospect you’re actively pitching might get flagged after 3 days of silence. An established client on a retainer might not need attention unless 2 weeks have passed. You set the rules once; the agent applies them continuously.

Starting with Calendar-Only Integration

The full pattern requires email access, which is one of the higher-risk integrations available — it gives an automated agent the ability to read the entire inbox. The incident where a researcher’s inbox was bulk-deleted by a runaway agent demonstrates the operational risk of treating email access as a default.

A pragmatic starting point: implement the CRM with calendar-only integration first.

Calendar data gives you:

  • Meeting history — who you’ve met with, when, how often
  • Meeting patterns — which clients get regular cadence check-ins, which ones are ad-hoc
  • Upcoming meeting preparation — pulling context for tomorrow’s call without needing email history

Calendar access is lower-risk than email access because the blast radius of a misconfigured agent is limited. A calendar-reading agent might expose meeting titles and attendees to the wrong place; it can’t delete emails or forward sensitive correspondence.

After you’ve seen the calendar-only setup behave reliably for a few weeks, you can evaluate whether adding email access is worth the additional capability it provides. The see-before-you-expand principle applies here the same way it does to database access scoping: start with the minimum that’s useful, expand only after you trust the behavior at the current level.

The Storage Architecture

Understanding what gets stored helps you assess the privacy implications.

SQLite database (structured data): Contact records, interaction timestamps, relationship scores, meeting metadata.

Vector embeddings (semantic layer): Compressed representations of interaction summaries — not the full text of emails, but semantic vectors that enable similarity search. The agent uses these to answer “who’s similar to X” or “what interactions relate to Y topic.”

Both are stored locally on the machine running the agent. This is the key difference from a cloud CRM: the data doesn’t leave your infrastructure. It’s not sent to Salesforce’s servers or synced to a third-party service. The privacy model is closer to “local application with AI capabilities” than “cloud SaaS with AI features.”

The local storage model means backups are your responsibility. A SQLite file that isn’t backed up and lives on a machine that fails takes the relationship history with it. For a solo consultant whose business depends on relationship continuity, losing this data is a real cost. Back up the OpenClaw data directory as part of your regular backup routine.

What the Pattern Can’t Do

The honest assessment of limitations:

It can’t tell you what to say. The agent can tell you that you need to follow up with a client. It can’t tell you what the right message is, when the relationship context makes a particular approach appropriate, or whether this is a good week to reach out given what you know about their situation. The relationship intelligence is yours; the agent tracks the mechanics.

Relationship health scores are proxies. “Haven’t talked in 2 weeks” is a signal, not a complete picture. Some client relationships have natural quiet periods — project phases where there’s no reason to check in. Others go cold suddenly in a way that’s meaningful. The agent can’t distinguish between these; you can.

Email context is shallow. The agent reads subject lines, sender/recipient patterns, and potentially message bodies (depending on configuration). It doesn’t understand the emotional register of the interaction, the history that makes a particular phrase significant, or the organizational dynamics of the client’s side. The relationship intelligence it builds is better than no record, but it’s structurally shallow.

Consent and confidentiality. If clients would be uncomfortable knowing that an AI agent has read your email correspondence with them and built a relationship profile from it, that’s a relevant consideration. Most client contracts don’t address AI data handling, but some do. Review yours before connecting email access to any agent.

Practical Setup Order

  1. Start with calendar integration only. Get the meeting history and upcoming prep working. Use it for 2-4 weeks.
  2. Define your follow-up thresholds. What silence period is normal vs. a flag? Different rules for different relationship types (active client, prospect, past client, network contact).
  3. Configure and test proactive nudges. Make sure the messages are useful and not overwhelming. Adjust thresholds based on what you receive.
  4. Evaluate email access. After the calendar-only setup is working well, decide whether the added capability of email scanning is worth the additional exposure. It probably is for active client relationships. It may not be for older or lower-priority contacts.
  5. Set up backup. Before any significant data accumulates, make sure the SQLite file and embedding store are included in your regular backup.