Execution Harness
v1.1.0Agent 执行可靠性体系的导航入口。当用户询问 agent 为什么停了、怎么防 agent 提前退出、execution harness 是什么、40 个 pattern 有哪些、6 轴架构、hook 怎么配时匹配。不执行具体操作——各子 skill 分别处理。
⭐ 0· 86·0 current·0 all-time
by_silhouette@lanyasheng
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
medium confidencePurpose & Capability
The declared purpose is a 'navigation entry' for execution reliability patterns and explicitly says it 'does not execute operations' itself. The package contains many bash hook scripts and tests and the SKILL.md gives example settings that call those scripts (e.g., bash execution-loop/scripts/ralph-stop-hook.sh). This is explainable (the hub points users to sub-skills and shipped scripts), but there's a mild mismatch between the 'not execute' wording and the fact that the repo includes runnable scripts and example configs that will execute them if the user wires them into ~/.claude/settings.json. Review the scripts before enabling.
Instruction Scope
Runtime instructions and examples direct agents (or operator's config) to run local bash scripts and to read/write session/transcript files under the user's home (e.g., ~/.openclaw/shared-context/sessions, .working-state, ~/.claude/settings.json). The scripts operate on local filesystem artifacts, tmux panes, run linters/tests, and manipulate state (git stash, write handoff files). They do not reference external endpoints or ask for secrets in the metadata, but they do have broad local-file access — expected for this purpose, but something to audit before enabling.
Install Mechanism
No install spec is provided (instruction-only metadata), which minimizes automatic remote code installation. The bundle includes scripts and tests but no automated download-from-untrusted-URL step. The user would need to place/clone these files and add hooks manually or via their agent config; that manual step is the security control point.
Credentials
The skill declares no required environment variables, credentials, or config paths. The included scripts expect runtime-provided variables (e.g., TRANSCRIPT_PATH, NC_SESSION, COMPACTION_EXTRACT_INTERVAL) typical for hooks; they do not request API keys or tokens. No unrelated service credentials are demanded.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges, but the SKILL.md explicitly recommends editing ~/.claude/settings.json to add hooks that will run the shipped scripts. Enabling those hooks gives the scripts persistent operational presence (they'll run on hook events) and lets them write into user home directories (sessions, handoffs, working-state). This is expected for a hooks-based harness, but it increases the blast radius — inspect scripts and back up configs before enabling.
Assessment
This bundle is a coherent 'execution harness' and primarily operates on local files and hooks. Before installing or enabling the hooks, do the following: 1) Inspect the included bash scripts (scripts/*) to ensure they do only what you expect — pay attention to any 'git', 'rm', or tmux commands and to where files are written (HOME paths). 2) Backup your ~/.claude/settings.json and any repositories the harness might touch. 3) Run the scripts in a sandbox or container (or under a test HOME) to observe behavior. 4) Start by enabling only non-destructive hooks (e.g., read-only token-budget or context-usage) and review outputs before enabling hooks that run git stash, checkpoint/rollback, or send input to tmux. 5) If you run the test suite (pytest) do so in an isolated environment. 6) Only enable hooks if you trust the source or have audited the code; although there are no external endpoints or requested credentials in the metadata, scripts with filesystem and tmux access can still disrupt local workflows if misconfigured.Like a lobster shell, security has layers — review code before you run it.
agentvk97c9t8mf0q6xjnkvqnm3c2c5984bzg8harnessvk97c9t8mf0q6xjnkvqnm3c2c5984bzg8hooksvk97c9t8mf0q6xjnkvqnm3c2c5984bzg8latestvk970cf1jwma296pd7jb8canmxx84h7bdreliabilityvk97c9t8mf0q6xjnkvqnm3c2c5984bzg8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
