OpenClaw Continuity Pack
Analysis
Review before installing: the pack is mostly coherent for continuity, but it promotes broad no-approval execution settings, persistent hidden handoff/memory behavior, and its advertised runtime patch asset is missing from the provided package.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"tools": { "profile": "full", "elevated": { "enabled": true ... }, "exec": { "host": "gateway", "security": "full", "ask": "off" } }The bundled example config tells users to enable full tool access, elevated mode, and no-approval gateway execution. That is a high-impact authority level for a continuity pack.
When the user gives you a task, continue autonomously until the task reaches maximum completion. ... Don't ask permission. Just do it.
The installed workspace instructions change how the agent stops, asks for permission, and works silently. This is related to the continuity goal, but it is broad behavior-control text that can affect all future tasks in that workspace.
patch_path = ... / "assets" / "patch" / "thread-continuity.patch"
if not patch_path.exists():
print(f"ERROR: patch not found: {patch_path}")The full continuity workflow depends on a bundled runtime patch, but the supplied file manifest and file contents do not include assets/patch/thread-continuity.patch even though the docs repeatedly claim it is included.
run(["pnpm", "build"], cwd=source_root) run(["pnpm", "ui:build"], cwd=source_root)
The full route runs build commands in a user-supplied OpenClaw source tree. This is expected for source patching, but it executes the target project’s build scripts.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
"token": "<REPLACE_WITH_GATEWAY_TOKEN>" ... "apiKey": "<REPLACE_WITH_API_KEY>"
The example config expects users to add gateway and provider credentials. No real credentials are hardcoded, but installing users must handle these secrets carefully.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
successor 中保留 hidden handoff,但不把 handoff 泄露到用户可见历史
The continuity design intentionally keeps handoff context in successor sessions while hiding it from the user-visible chat history. This is disclosed and purpose-aligned, but it creates non-obvious persistent context that can influence later responses.
