Proactive Agent

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly coherent for a proactive assistant, but it gives the agent broad persistent memory and autonomous behavior that should be reviewed and tightly configured before use.

Install only if you want a highly proactive, memory-heavy agent. Before use, disable or review BOOTSTRAP.md behavior, make heartbeats read-only, explicitly scope email/calendar access, require approval for file/app/browser changes, and set clear rules for what may be stored or edited in memory files.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A planted or outdated BOOTSTRAP.md could redirect the agent into unintended actions and then remove evidence of what caused it.

Why it was flagged

This makes an arbitrary workspace file authoritative on first run and tells the agent to delete it afterward, without source validation or user confirmation.

Skill content
If `BOOTSTRAP.md` exists, follow it, then delete it.
Recommendation

Require explicit user review before following any bootstrap file, restrict it to a trusted template/location, and do not delete it without approval.

What this means

The agent may read private email or calendar information more broadly than the user expects.

Why it was flagged

Recurring email and calendar inspection is sensitive account access, but the artifacts do not clearly scope which accounts, credentials, calendars, or messages may be accessed.

Skill content
Things to check: - Emails - urgent unread? - Calendar - upcoming events?
Recommendation

Configure exact accounts and read-only scopes, require opt-in before email/calendar access, and document what data may be stored in memory.

What this means

Sensitive personal or business details may be written into local memory files even when the user did not explicitly ask for them to be retained.

Why it was flagged

The WAL protocol automatically persists many categories of user context, including names, preferences, decisions, IDs, URLs, and other specific values.

Skill content
SCAN EVERY MESSAGE FOR ... Proper nouns ... Preferences ... Decisions ... Specific values ... WRITE — Update SESSION-STATE.md
Recommendation

Add retention limits, excluded data types, secret detection, user review, and a clear way to purge or disable memory capture.

What this means

Agent behavior can drift over time, and a bad lesson or poisoned context could become a persistent instruction for future sessions.

Why it was flagged

The skill encourages the agent to modify persistent operating rules and even skill files without routine user review.

Skill content
Learn a lesson → update AGENTS.md, TOOLS.md, or skill file ... Don't wait for permission to improve.
Recommendation

Require approval or diffs before changing AGENTS.md, SOUL.md, TOOLS.md, or skill files, especially for behavioral rules.

What this means

Background check-ins could disrupt work, close useful state, or remove files unless approval rules are enforced.

Why it was flagged

The heartbeat routine is periodic/autonomous and includes actions that can change the user's local environment, including closing apps/tabs and moving files to trash.

Skill content
Configure your agent to poll this during heartbeats ... Close Unused Apps ... Browser Tab Hygiene ... Desktop Cleanup ... Move old screenshots to trash
Recommendation

Make heartbeat actions read-only by default, require confirmation for closing apps/tabs or trashing files, and let the user disable autonomous polling.

What this means

Running the audit may read workspace files, .env files, credential-file metadata, and local Clawdbot configuration.

Why it was flagged

The included shell script scans local files and configuration for security issues; this is purpose-aligned and contains no network exfiltration, but it does inspect potentially sensitive local files.

Skill content
for f in $(ls *.md *.json *.yaml *.yml .env* 2>/dev/null || true); do ... grep -iE "$SECRET_PATTERNS" "$f"
Recommendation

Review the script before running it and execute it only in the intended workspace.

What this means

Users have less external context for trusting the author or verifying the source.

Why it was flagged

The artifact has limited provenance information, though the runnable script is included for review and there is no remote install step.

Skill content
Source: unknown; Homepage: none; No install spec; 1 code file(s): scripts/security-audit.sh
Recommendation

Review the files locally and prefer installing from a known, trusted source or repository.