Rule Creation

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill is open about its purpose, but it can automatically make persistent changes to your agent’s rules and generates executable workflows from unescaped rule text.

Install only if you want this skill to automatically edit your OpenClaw governance files. Review diffs before accepting changes, avoid feeding it untrusted rule text, and inspect any generated Lobster workflows before enabling or running them.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A rule-like phrase could cause the agent to edit governance files or create enforcement artifacts before you review the change.

Why it was flagged

The skill mandates automatic file/workflow mutation without an approval checkpoint.

Skill content
When this skill triggers, **always** execute the following steps in order. Do NOT ask permission — CE-PROCESS compliance means **wire first, report after**.
Recommendation

Require explicit confirmation, a dry-run diff, and a user-selected target before writing persistent rules or workflows.

What this means

A mistaken, ambiguous, or adversarial rule can be stored and reused by the agent in future sessions.

Why it was flagged

The script persists generated rule text into OpenClaw context/governance files under the user's home directory.

Skill content
return path.join(clawd, 'TOOLS.md'); ... fs.writeFileSync(targetFile, newContent, 'utf8');
Recommendation

Treat new rule text as untrusted until approved, record provenance, provide rollback/removal instructions, and avoid automatic persistence from broad trigger phrases.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A crafted rule description could alter the generated workflow and run unintended shell commands when Lobster later executes it.

Why it was flagged

User/env-provided rule descriptions are inserted directly into shell command blocks in generated .lobster workflows without shell/YAML escaping.

Skill content
command: |\n      echo "Rule: {{RULE_DESCRIPTION}}" ... .replace(/\{\{RULE_DESCRIPTION\}\}/g, ruleDescription)
Recommendation

Do not embed arbitrary rule text inside executable shell commands; escape or validate values, store rule text as data, and use safer non-shell execution patterns.