Subagent Sheepdog
v1.0.1Launch verification and watchdog discipline for delegated, backgrounded, browser-driven, and long-running tasks. Prevents false "running" claims, clarifies f...
⭐ 1· 76·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name and description promise launch verification and watchdog discipline for delegated/long-running tasks; the SKILL.md contains only procedural guidance and state models consistent with that purpose. No unrelated binaries, env vars, or config paths are requested.
Instruction Scope
Instructions are limited to behavioral rules, state transitions, heartbeat semantics, retry policy, and recommended messaging. They do not instruct reading system files, accessing credentials, contacting external endpoints, or performing unexpected I/O.
Install Mechanism
This is instruction-only with no install spec and no code files, so nothing will be downloaded or written to disk by the skill itself.
Credentials
The skill requires no environment variables, credentials, or config paths. The guidance does not reference secrets or unrelated services, so requested privileges are proportionate.
Persistence & Privilege
always is false and model invocation is allowed (platform default). The skill does not request permanent presence or permission to modify other skills or system-wide settings.
Assessment
This is a policy/style skill (no code, no installs, no secrets) that defines how an agent should verify launches and report state; it is internally coherent and low-risk by itself. Before enabling it, consider: (1) whether your agent runtime and other installed skills actually implement the verification checks the guidance assumes (spawn/process/browser checks), (2) whether other skills that perform process spawning or network calls are trusted (this guidance only changes reporting/decision logic, not what external actions are taken), and (3) auditing/logging so you can verify the agent follows these rules in practice. If you plan to combine this with capabilities that can launch processes or connect to the network, review those skills' permissions and logs as well.Like a lobster shell, security has layers — review code before you run it.
latestvk97bt1p3hzbgcpvndsns5pd1kx83kdtt
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🛎️ Clawdis
