clawgate
Analysis
This instruction-only skill is a disclosed approval-policy guide that can let the agent perform some medium-risk actions without asking again, while blocking higher-risk actions.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Direct-execute as `MEDIUM` if any are true: ... internal send or limited-side-effect API call ... install dependency ... restart isolated development service ... Execution rule: - do not ask for confirmation ... - execute directly
The skill intentionally permits some mutating or externally visible medium-risk actions to proceed without an extra confirmation. This is central to the skill’s purpose, but users should understand that the approval boundary changes.
Paste this snippet into the always-injected OpenClaw entry point you actually use, such as `AGENTS.md` or a standing-order equivalent. Do not treat this file as already active policy. Installation alone does not activate `clawgate`.
Activation is designed to persist as an always-injected governance instruction, but the artifact makes activation manual and explicitly says it should not be treated as already active.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Treat the following surfaces as OpenClaw-specific escalation points: - `~/.openclaw/openclaw.json` ... approval policy, delivery, channel, router, or gateway configuration ... Classification rules: - reading these surfaces without mutation stays `LOW`
The policy allows direct read-only inspection of local OpenClaw configuration and control-plane surfaces, while escalating mutations. This is disclosed and relevant to governance, but config files can contain sensitive operational details.
