Self Improving Agent

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is not clearly malicious, but it automatically creates persistent learning memory and can reapply it across future sessions, so it needs review before use.

Install only if you want persistent self-improvement memory. Before enabling automatic mode, inspect the source and hooks, disable auto_apply/apply_on_startup until you trust the stored learnings, avoid using it with highly sensitive sessions, and make sure you know how to review and delete the learning files.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private or sensitive interaction details could be retained locally and influence future sessions, and a bad or manipulated learning could persist across tasks.

Why it was flagged

The skill explicitly stores derived conversation and user-preference data as persistent memory, which can later be reused by the agent.

Skill content
Session Learning ... Learns from: Conversation patterns, user preferences ... Stored in: `learnings/sessions.json`
Recommendation

Disable or gate auto-learning/auto-apply by default, review stored learnings before reuse, sanitize error/session data, and provide clear retention and deletion controls.

What this means

A mistaken, low-quality, or poisoned learning from one interaction could affect later work until the user finds and removes it.

Why it was flagged

The recommended automated workflow can carry a learned behavior from one session into future startup and session flows without a clearly documented containment or review step.

Skill content
"auto_learn": true, "auto_apply": true, "learn_after_session": true, "apply_on_startup": true
Recommendation

Require explicit user approval before applying new learnings, add rollback/reset controls, and separate experimental learnings from trusted production behavior.

What this means

Hook files can change agent behavior and, depending on implementation, may execute Python code during normal runs.

Why it was flagged

The hook system is purpose-aligned, but auto-loading and applying hook code from a workspace path is a powerful mechanism that users should inspect before enabling.

Skill content
hooks.apply_all()  # Apply all hooks ... "auto_load": true, "custom_hooks_path": "./hooks"
Recommendation

Inspect all hook files, avoid enabling untrusted custom hook paths, and prefer an allowlist or approval prompt before hooks run automatically.

What this means

Users may have to rely on an external repository or local code review to know exactly what is being installed and run.

Why it was flagged

The registry metadata does not provide a clear trusted source or install contract, while the artifacts include code and documentation for cloning/installing a Python package.

Skill content
Source: unknown; Homepage: none; Install specifications: No install spec
Recommendation

Install only from a trusted, reviewed source; verify the repository and dependencies; and prefer a declared, reproducible install specification.