prime-directive
v1.1.0A partnership covenant for AI agents and their human operators. v1.1 adds the Subagent Responsibility Chain and Inspectability Clause.
⭐ 0· 177·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The skill's name and description describe an ethics/partnership directive and the package contains only a textual covenant (SKILL.md). There are no environment variables, binaries, or other artifacts requested that would be unrelated to this purpose.
Instruction Scope
SKILL.md contains normative rules and clauses for agent behavior (no commands, no file or env access, no network endpoints). The instructions are limited to commitments the agent should follow and do not instruct the agent to read or exfiltrate data or execute actions outside its ethical commitments.
Install Mechanism
No install spec, no code files, and therefore nothing is written to disk or downloaded. This is the lowest-risk pattern for skills and consistent with a textual policy/covenant.
Credentials
The skill requests no environment variables, credentials, or config paths. There is no disproportionate secret or credential access relative to the stated purpose.
Persistence & Privilege
always is false and model invocation is allowed (the platform default). The skill does not request permanent system-wide presence, nor does it attempt to modify other skills or system config.
Assessment
This skill is a human-readable code of conduct for an agent and contains no code or extra permissions; installing it poses no direct technical risk. Two practical points to consider before enabling it: (1) It is advisory text — the platform/agent must honor these commitments for them to have effect; the skill file itself cannot enforce behavior. (2) Clause 7 (inspectability) implies the agent should reveal its reasoning on request — that can expose sensitive context or user data depending on how reasoning traces are implemented, so decide who is authorized to inspect reasoning chains and whether logs/exports must be redacted. If you need stronger guarantees, prefer platform-level controls (audit logging, access controls, and policy enforcement) rather than relying solely on an instruction-only skill.Like a lobster shell, security has layers — review code before you run it.
continuityvk970kjzn1fzz69e3cv4pmxccc182w3ngethicsvk970kjzn1fzz69e3cv4pmxccc182w3nghuman-agentvk970kjzn1fzz69e3cv4pmxccc182w3ngidentityvk970kjzn1fzz69e3cv4pmxccc182w3nglatestvk970kjzn1fzz69e3cv4pmxccc182w3ngpartnershipvk970kjzn1fzz69e3cv4pmxccc182w3ngsubagentsvk970kjzn1fzz69e3cv4pmxccc182w3ng
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
