Verified Task

v1.0.7

Enforce correctness before execution. Verify any task output and only proceed if it passes—override requires explicit operator approval.

0· 139·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (verification guardrail) match the contents: SKILL.md, README, examples, and a small reminder script all describe the same verification gate. No unrelated credentials, binaries, or services are requested.
Instruction Scope
Runtime instructions are limited to defining specs, checking outputs, returning PASS/FAIL/INDETERMINATE, and requiring human overrides. They do not instruct reading system secrets, calling external endpoints, or broad data collection. The optional external verification step is explicitly optional and warns against sending secrets.
Install Mechanism
No install spec; only an instruction-only skill plus a tiny activator.sh reminder (283 bytes). Nothing is downloaded or written to disk by an installer.
Credentials
The skill declares no environment variables, credentials, or config paths. SKILL.md does not reference hidden env vars or other credentials.
Persistence & Privilege
Flags are default (always:false, user-invocable:true, model invocation allowed). The skill does not request permanent/system-wide presence or modify other skills' configs.
Assessment
This skill appears coherent and low-risk: it provides procedural guidance to verify outputs and requires explicit human override for non-PASS results. Before installing, ensure your agent actually enforces the human-override requirement and logs overrides (who approved, reason, timestamp). If you integrate any external verification service, avoid sending secrets or sensitive payloads and review that integration separately. The included activator.sh is a harmless reminder script; it does not add hidden behavior.

Like a lobster shell, security has layers — review code before you run it.

latestvk975qyak0yy320q0nvt806f4cx83ty28verification ai-agents workflow-safety automation trustvk975y1n7awn8ratd7xaf0c9h6d83t7jb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments