Autonomy Ladder

ReviewAudited by ClawScan on May 10, 2026.

Overview

This instruction-only skill is coherent, but its default framework would let an agent perform production, financial, infrastructure, and credential actions without prior approval.

Only install or copy this framework after rewriting the example tiers for your own environment. Treat refunds, production deploys, credential changes, infrastructure changes, public/customer communications, and sensitive-data work as approval-required unless you have precise limits, runbooks, rollback steps, and audit logging.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied without careful changes, the agent could make real account, production, or business changes before the user reviews them.

Why it was flagged

These default Tier 2 examples tell the agent to act immediately and report afterward for business, production, code, and infrastructure changes. The actions are high-impact and not clearly bounded by explicit approval, rollback, or containment requirements.

Skill content
- Process refunds under $50
- Deploy bug fixes to production (must verify fix works)
- Merge PRs that pass CI with no conflicts
- Scale infrastructure up/down within budget guardrails
Recommendation

Move production deploys, refunds, PR merges, infrastructure scaling, and similar account-mutating actions to an approval-required tier unless the user has defined narrow scopes, limits, rollback steps, and audit requirements.

What this means

An agent following this rule could change credentials or API keys before the user approves the exact account, service, or rotation plan.

Why it was flagged

The default Tier 1 list places credential and API-key rotation in an act-immediately tier. That would require privileged access and can break or expose connected systems if not tightly scoped.

Skill content
- Rotate expired credentials and API keys
Recommendation

Require explicit approval for credential and API-key changes, or define exact services, rotation procedures, notification requirements, and rollback plans before allowing autonomous execution.

What this means

The agent may keep applying these autonomy rules later, even when the context has changed.

Why it was flagged

The skill is designed to become persistent agent guidance. That is purpose-aligned, but it means any overly broad or stale autonomy rules may be reused across future sessions.

Skill content
Add this to your `MEMORY.md` and reference it from `SOUL.md`
Recommendation

Store only customized, conservative rules in persistent memory, review them regularly, and require approval for changes to the ladder itself.

What this means

A mistaken autonomous action could affect live systems before the user has a chance to intervene.

Why it was flagged

These examples involve production and infrastructure operations. A wrong classification or bad automated action could propagate into service outages, failed deployments, or cost changes.

Skill content
- Fix monitoring alerts and restart crashed services
- Deploy bug fixes to production (must verify fix works)
- Scale infrastructure up/down within budget guardrails
Recommendation

Keep production and infrastructure actions approval-gated unless there are explicit runbooks, health checks, rollback procedures, and budget/service limits.