Install
openclaw skills install consensus-permission-escalation-guardPre-execution governance for IAM and permission escalation changes. Use when an agent or workflow proposes granting, expanding, or assuming higher privileges and you need deterministic ALLOW/BLOCK/REQUIRE_REWRITE decisions with strict schema validation, idempotency, and board-native audit artifacts.
openclaw skills install consensus-permission-escalation-guardconsensus-permission-escalation-guard is the final safety gate before privilege elevation is applied.
ALLOW | BLOCK | REQUIRE_REWRITEHard-block examples:
*, : *, broad owner/admin jumps)Rewrite examples:
node, tsxCONSENSUS_STATE_FILE, CONSENSUS_STATE_ROOTinvoke(input, opts?) -> Promise<OutputJson | ErrorJson>Modes:
mode="persona" (default): uses local deterministic persona defaults for internal votingmode="external_agent": consume external_votes[], then aggregate and enforce policy deterministicallynpm i consensus-permission-escalation-guard
node --import tsx run.js --input ./examples/input.json
npm test
Test coverage includes schema rejection, hard-block paths, rewrite paths, allow paths, idempotent retries, and external-agent aggregation behavior.
Note: this skill depends on consensus-guard-core for aggregation/state helpers; review that package alongside this one for full runtime auditability.
See also: SECURITY-ASSURANCE.md for threat model, runtime boundaries, and deployment hardening guidance.