Threshold Keel

ReviewAudited by ClawScan on May 1, 2026.

Overview

Threshold Keel appears to be a coherent safety guardrail skill, but users should notice that it can rely on an external CLI, persistent audit logs, and optional cloud sync.

This skill appears benign and purpose-aligned as a safety layer. Before installing or enabling CLI/cloud mode, make sure you trust the `threshold-keel` package, understand that Keel may log action metadata, and only configure the cloud API key if you want audit and policy data synced to Threshold Cloud.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may cause the agent to run local Keel commands and block, delay, or require approval for actions that change state.

Why it was flagged

The skill instructs the agent to run local CLI checks and use Keel as the gatekeeper for state-changing actions. This is broad tool-mediated control, but it aligns with the stated guardrail purpose.

Skill content
If the `keel` CLI is available (test: run `which keel` or `where keel` at the start of each session), use it for all policy checks, WAL operations, and quarantine management.
Recommendation

Install and use this skill only if you want Keel to mediate agent actions; review approval prompts carefully and make sure the local Keel CLI is trusted.

What this means

Using full CLI mode depends on installing and trusting the external `threshold-keel` package.

Why it was flagged

SKILL.md references an external pip package that supplies the `keel` CLI, while the provided artifact set contains no CLI source code. This is expected for a CLI-backed skill, but users are relying on that external package.

Skill content
install:\n      - kind: pip\n        package: threshold-keel\n        bins: [keel]
Recommendation

Install the CLI only from a trusted package source, verify the package identity, and keep it updated through normal package-management practices.

What this means

If the API key is configured, Keel can sync policy and audit data to the associated Threshold Cloud account.

Why it was flagged

The optional API key enables cloud-backed account access for sync. This is disclosed and purpose-aligned, but it is still a credential boundary users should understand.

Skill content
If `KEEL_CLOUD_API_KEY` is set in the environment, the CLI automatically syncs with Threshold Cloud.
Recommendation

Set `KEEL_CLOUD_API_KEY` only if you want cloud sync, and revoke or rotate it if you stop using the cloud feature.

What this means

Past approvals, policy entries, and action logs may persist and affect later agent sessions; with cloud sync enabled, this information may also be available in a web dashboard.

Why it was flagged

The skill intentionally creates persistent policy and audit context that can be reused across sessions and agents. This supports the guardrail purpose, but persistent policies and logs can influence future behavior and may contain sensitive action metadata.

Skill content
Policies persist across agents and sessions. WAL events are stored in the Cloud and visible in the web dashboard.
Recommendation

Regularly review stored policies and audit logs, avoid putting secrets in action payloads, and use local-only mode if cloud persistence is not desired.