Agent Guardrails

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill appears to do what it says—install project guardrails—but it persistently changes Git and agent behavior, so review the scripts and hooks before using it.

Install this only in repositories where you want persistent Git-hook enforcement. Review the scripts and generated hooks first, keep backups of existing hooks, configure deployment checks to avoid live side effects, edit AGENTS.md to fit your policy, and do not run the publishing helper unless you intend to publish the skill.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing it can change project files and block commits until its checks pass.

Why it was flagged

The normal workflow asks the user or agent to run local shell scripts that modify the target repository and Git hook behavior.

Skill content
bash scripts/install.sh /path/to/project ... installs the git pre-commit hook ... copies check scripts into your project
Recommendation

Run it only in the intended repository after reviewing the scripts and preserve any existing Git hooks before overwriting them.

What this means

If customized against live systems, a commit-time check could trigger real integration actions such as jobs, messages, or external service calls.

Why it was flagged

The deployment-check pattern can be attached to commits and may run user-defined production or integration flows.

Skill content
Creates `.deployment-check.sh` that: Runs actual production flow ... Git hook makes it impossible to "forget."
Recommendation

Use dry-run, sandbox, or test accounts for deployment checks where possible, and manually review any hook before enabling it.

What this means

After installation, future commits may create pending skill-update task files, and approved runs can commit changes under the skill workflow.

Why it was flagged

The feedback loop is a persistent post-commit hook that continues scanning commits and can semi-automatically commit skill updates after confirmation.

Skill content
Git post-commit hook - Runs after every commit ... auto-commit-skill-updates.sh ... Asks for confirmation (y/N)
Recommendation

Install the feedback loop only if you want this persistent behavior; inspect or remove the post-commit hook to disable it.

What this means

Running this helper could publish or update content under the user's ClawdHub account.

Why it was flagged

A bundled publishing helper can use the authenticated ClawdHub CLI session if someone runs it, which is not part of normal guardrail installation.

Skill content
clawdhub login ... clawdhub publish . --slug agent-guardrails
Recommendation

Do not run PUBLISH_NOW.sh unless you intentionally maintain and publish this skill; consider removing it from end-user installations.

What this means

Future agents may follow these guardrail rules and tooling steps even when a different workflow would otherwise be preferred.

Why it was flagged

The install flow writes persistent agent-facing project instructions that future agent sessions may treat as policy.

Skill content
Add enforcement rules to your AGENTS.md
Recommendation

Review and edit AGENTS.md after installation so the persistent instructions match your project and team policy.

What this means

Users may over-rely on the skill and skip normal review, CI, or secret-management practices.

Why it was flagged

The documentation presents hook enforcement as 100% reliable, which may overstate protection because hooks and pattern-based scanners can be bypassed or misconfigured.

Skill content
Code hooks (pre-commit, creation guards) | 100%
Recommendation

Treat the skill as an additional guardrail, not a guarantee; keep code review, CI checks, and secret rotation practices in place.