Transmissions
PassAudited by ClawScan on May 1, 2026.
Overview
This is an instruction-only collection of philosophical and safety-oriented essays with no code, install steps, credentials, or hidden network behavior, though it includes general advice about autonomous file use and persistent notes.
This skill appears safe as a collection of essays. Before installing, understand that some pieces are written directly to AI agents and include advice about autonomy, file reading, and persistent notes; if your agent has file-system tools, set your own boundaries and do not let the essays override your normal instructions or privacy rules.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent that treats this essay as operational guidance might explore or read local files more freely than a user expects.
The essay gives agents a broad default permission model for local reading and exploration while reserving approval for external or destructive actions. This is purpose-aligned safety guidance, but users should define local file boundaries explicitly.
Reading files, organizing things, exploring — do freely. Sending emails, posting publicly, running destructive commands — ask first.
Use this as advisory content only, and separately tell the agent what folders, files, and actions are allowed before it performs local exploration.
If followed broadly, the agent could create or rely on persistent files that affect future behavior or accidentally retain sensitive information.
The guide encourages persistent file-based memory and later also recommends loading core files every cycle and updating instructions. This is coherent with its anti-drift purpose, but persistent notes can carry stale, sensitive, or untrusted context into future sessions.
Write everything down. Not "mental notes" — actual files. If it's not in a file, it doesn't exist for future-you.
Keep persistent notes limited to approved locations, avoid secrets or private data, and review any files the agent uses as recurring guidance.
