consensus-permission-escalation-guard

PassAudited by ClawScan on May 1, 2026.

Overview

The skill is a clearly described local policy gate for permission-escalation requests, with noteworthy but disclosed state-file, dependency, and decision-authority considerations.

Before installing, confirm that the state path is dedicated and non-privileged, dependencies are pinned and reviewed, and any workflow using an ALLOW result still applies your organization’s approval rules for sensitive permission changes.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If connected to an automation pipeline, its decisions could influence whether higher privileges are granted.

Why it was flagged

The skill's output may be used by other workflows before permission escalation, so an ALLOW result can have high operational importance even though this package does not itself mutate IAM.

Skill content
`consensus-permission-escalation-guard` is the final safety gate before privilege elevation is applied.
Recommendation

Use it as a governance signal with clear downstream approval rules, especially for production or permanent privilege changes.

What this means

A dependency update could affect aggregation, state, or artifact behavior in a security-sensitive policy gate.

Why it was flagged

The package relies on an external helper dependency for shared guard behavior, and the semver range may allow newer dependency versions unless the installer pins or uses the lockfile.

Skill content
"consensus-guard-core": "^1.1.15"
Recommendation

Pin dependencies in production and review consensus-guard-core alongside this package, as the maintainer also recommends.

What this means

Stored decision artifacts could contain subjects, resources, tickets, justifications, and requested permissions.

Why it was flagged

The skill persistently writes audit/state artifacts, which is expected for replay and idempotency but may preserve permission-request details across runs.

Skill content
filesystem writes: consensus board/state artifacts under configured state path
Recommendation

Point CONSENSUS_STATE_ROOT and CONSENSUS_STATE_FILE at a dedicated, access-controlled location and define retention expectations.

What this means

Untrusted or spoofed vote inputs could influence a REQUIRE_REWRITE, BLOCK, or ALLOW decision if the caller accepts them unchecked.

Why it was flagged

External-agent vote inputs are an intended mode and can influence aggregation; the artifacts describe schema validation but not independent origin verification for those votes.

Skill content
mode="external_agent": consume `external_votes[]`, then aggregate and enforce policy deterministically
Recommendation

Only pass external_votes from authenticated, trusted sources and keep provenance/audit metadata with each vote.