Improvement Gate

v1.0.0

当执行完变更需要验证是否应保留、候选被标记 pending 需要人工审批、或想查看待审队列时使用。7 层机械门禁: Schema→Compile→Lint→Regression→Review→Doubt→HumanReview,任一 required 层失败即拒绝。不用于打分(用 improvement-disc...

0· 72·0 current·0 all-time
by_silhouette@lanyasheng
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe a multi-layer quality gate and the provided scripts (gate.py, review.py) implement schema/compile/lint/regression/review/doubt/human-review layers and a human-review CLI; required inputs (ranking, execution, evaluation artifacts and a state directory) match the stated purpose.
Instruction Scope
SKILL.md instructs the agent to run local Python scripts with artifacts and a state root. The runtime steps reference only local files, review queue state, and orchestrator-provided artifacts. There are no instructions to read unrelated system secrets or send data to third-party endpoints.
Install Mechanism
No install spec — instruction-only with bundled scripts and tests. No downloads, package installs, or external executables are required.
Credentials
The skill declares no required environment variables, credentials, or external config paths. The code operates on artifact JSON and a user-provided state directory, which is proportionate to a gate/review workflow.
Persistence & Privilege
always is false and the skill does not demand permanent platform-level privileges. It reads/writes review files under the provided state-root and may call restore_backup/update_state — file I/O is expected for a gate but means callers should choose a safe state-root.
Assessment
This skill appears coherent for enforcing a multi-layer quality gate. Before installing or running it: 1) Verify the implementation of the repo-local helpers (lib.state_machine, lib.common) since gate.py calls restore_backup(), update_state(), and writes review/receipt JSON files — those functions control what gets changed on disk. 2) When invoking the gate, point --state-root at a controlled directory and ensure execution/ranking/evaluation artifacts come from trusted orchestrator components; the gate trusts those artifacts (including a rollback_pointer.target_path) and may operate on the target path. 3) Review restore_backup() / rollback behavior to confirm it cannot be abused to overwrite sensitive files if given a crafted artifact. 4) Run the included tests locally to confirm behavior in your environment. Overall the skill does not request unrelated credentials or network installs and is consistent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk9767ev4ejz3f4gcrbkp4ty41h848jy4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments