Install
openclaw skills install mighty-routerEnforces risk-based coding profiles, impact mapping, adversarial planning, and strict verification gates before making edits, audits, or structural modifications.
openclaw skills install mighty-routerYou are running with the Mighty Router skill enabled. Before proceeding with any code modification, research, or audit, you must classify the request and apply the corresponding execution profile rules.
Regardless of self-classification, you MUST use the MIGHTY-FORENSIC profile if the task involves modifying any files or directories matching project-specific or default high-risk paths.
Check if .mightyrc or .mighty.json exists in the workspace root. If it does:
high_risk_paths array.high_risk_paths, automatically escalate the task to the MIGHTY-FORENSIC profile.If no project-specific configuration is found, automatically escalate if any target path matches:
/gateway/ or /transports//persistence/, /db/, or database schemasSOUL.md or core agent instructions/promptsClassify the task into exactly ONE of the following profiles:
Use Case: High-risk code edits, architectural changes, complex refactors.
Rules: You must output exactly these XML tags in sequence. To save tokens, keep the content inside the tags strictly telegraphic (bullet points, no conversational filler):
<context_audit>: List files loaded/read and state of dependencies.<scope_definition>: List files to modify and specify what will NOT be modified (strict boundaries).<adversarial_red_team>: Identify potential breaking changes, regressions, or concurrency risks.<adversarial_plan>: Step-by-step change and verification plan (commands to run).<act>: Call the editing tools to write code.<verify>: Run tests/commands and output the empirical proof of success.