Praesidia

PassAudited by ClawScan on May 10, 2026.

Overview

Praesidia is a coherent instruction-only integration for a Praesidia API key, with expected but important account-access and external-API data-sharing considerations.

Install only if you intend to connect OpenClaw to Praesidia. Use a least-privilege API key, keep the API URL trusted, review any guardrail changes before applying them, and avoid sending sensitive validation content unless Praesidia's data handling is acceptable.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The assistant can access Praesidia resources allowed by the API key, including private agent and guardrail information.

Why it was flagged

The skill uses a user-provided Praesidia API key for authenticated account and organization API calls.

Skill content
requires":{"env":["PRAESIDIA_API_KEY"]} ... "Authorization": "Bearer ${PRAESIDIA_API_KEY}"
Recommendation

Use a least-privilege Praesidia key, keep the production API URL on HTTPS, and revoke or rotate the key if it is no longer needed.

What this means

If invoked with the wrong organization, agent, or template, the assistant could alter how an agent blocks, warns, redacts, or replaces content.

Why it was flagged

The documented workflow can create an enabled guardrail through an authenticated POST request, changing the user's Praesidia configuration.

Skill content
POST ${PRAESIDIA_API_URL}/organizations/{orgId}/guardrails ... "isEnabled": true
Recommendation

Before applying guardrails, confirm the exact organization, agent ID, template, action, and rollback plan with the user.

What this means

Messages or other text submitted for validation may leave the local environment and be processed by Praesidia or a configured custom endpoint.

Why it was flagged

The validation workflow sends user-selected content to the configured Praesidia API endpoint for guardrail checking.

Skill content
POST ${PRAESIDIA_API_URL}/organizations/{orgId}/guardrails/validate ... "content": "Text to validate"
Recommendation

Do not validate sensitive or regulated content unless the Praesidia endpoint and data-handling terms are appropriate for that data.

What this means

Users may place too much confidence in a verification score without doing their own risk review.

Why it was flagged

The documentation encourages strong safety wording based on a trust score, which could be overread as a complete security guarantee.

Skill content
Recommendation: This agent is fully verified and safe for production use.
Recommendation

Present Praesidia scores as one trust signal, not as a guarantee that an agent is safe in every environment.