AI Swarm Orchestration
Analysis
This is a disclosed but very powerful autonomous coding swarm that can run AI coding agents with permission bypasses and automatically integrate code, so it should be reviewed carefully before installation.
Findings (8)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Source: unknown; Homepage: none ... Required binaries ... none ... Install specifications: No install spec
The skill is high-impact executable shell automation, but the registry metadata gives no provenance, homepage, install contract, required binaries, or credential declarations.
Claude | `claude --model X --dangerously-skip-permissions -p "prompt"` ... Codex | `codex --model X --dangerously-bypass-approvals-and-sandbox "prompt"`
The documented agent commands bypass normal approval and sandbox protections while giving coding agents repository and shell-level authority.
Auto-merge to main, update ESR, notify WB
The integration phase can automatically merge parallel agent work into the main branch after the swarm completes.
# Check verdict file; auto-infer if missing (watcher decides) ... `Integration review auto-passed ... clean exit, no issues indicated`
The script can treat a missing mandatory review verdict as a successful review, which may overstate assurance.
Launches agents in tmux sessions ... Starts per-agent completion watchers ... Starts integration watcher (auto-merge when all done)
Detached agents and watchers are central to the skill and disclosed, but they continue acting asynchronously after the user starts the workflow.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
"claude": { "cli": "claude", "auth": "oauth" ... "codex": { "cli": "codex", "auth": "oauth" ... "gemini": { "cli": "gemini", "auth": "oauth"The swarm uses locally authenticated AI provider accounts, while the registry metadata does not declare a primary credential.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
All work logs are persisted to <project>/docs/history/ ... The following work logs were written by builder and reviewer agents ... USE THEM
Agent-written work logs are persisted and later reused as integration context, which is useful but can carry poisoned instructions or sensitive project details.
openclaw message send --channel "$NOTIFY_CHANNEL" --target "$NOTIFY_TARGET" --message "$msg"
The skill can send swarm status and integration messages through an external notification channel.
