How To Use Agent
Analysis
This instruction-only skill is purpose-aligned for controlled agent self-improvement, but users should review any approved changes to memory, prompts, tool policies, and self-update surfaces because they can persist across future sessions.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
system prompts, tool schemas, permission policies, connector policies
The skill explicitly covers tool schemas and connector/tool policy surfaces, which can affect how tools are used; however, it requires explicit approval, risk explanation, and rollback before modifying agent-owned data.
Source: unknown; Homepage: none
The skill has limited provenance metadata, although the provided artifacts contain no install script, no code files, and no dependency declarations.
If the change touches memory, tools, prompts, runtime behavior, startup, restart, routing, delegation, or persistence, treat it as architecture work.
The skill covers core agent subsystems where mistakes can propagate, but it also requires architecture notes, phased migration, progressive rollout, freezing adjacent systems, verification, and rollback.
startup, restart, routing, planner, delegation, or self-update logic
The skill may be used for self-update and lifecycle-related agent logic, which can affect future operation; the artifact bounds this with explicit approval and staged rollout requirements.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
permission policies, connector policies
Permission and connector policies are privilege-boundary surfaces; changing them can affect what the agent or integrations may do, though the skill requires explicit consent and rollback details.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
durable memory files, knowledge bases, wiki indexes, recall databases
The skill is designed to modify persistent memory and knowledge surfaces that future agents may reuse, which makes correctness and approval important.
