Intent Align

PassAudited by ClawScan on May 1, 2026.

Overview

This instruction-only skill is coherent and purpose-aligned, but users should deliberately scope any repo, GitHub, tracker, and persistent hub access they allow.

This skill appears safe to install as an instruction-only alignment workflow. Before using it, choose a conservative autonomy mode for important work, grant only the repository or service permissions needed for the current task, and review the generated alignment hub so it does not store secrets or stale instructions.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a higher-autonomy mode is selected, the agent may keep working through low-risk phases with only summaries or log-only check-ins.

Why it was flagged

The skill explicitly defines modes where the agent may continue across phases without confirmation at every step. This is disclosed and bounded by drift/risk checks, but it affects how much direct oversight the user has.

Skill content
`3 Aggressive`: Auto-continue on low drift; require confirmation on major deltas. `4 Exploratory`: Continue with log-only check-ins unless risk or ambiguity threshold is exceeded.
Recommendation

Use Strict or Balanced mode for sensitive, irreversible, or public-facing work, and set clear check-in points before execution.

What this means

The agent could change local project files or run project-local checks when the local-repo adapter is used.

Why it was flagged

The local repository adapter can modify project files and run local verification commands. That is expected for a repo-orchestration workflow, but it is a meaningful capability if pointed at the wrong path or command set.

Skill content
- Create/update artifacts, plans, and implementation files.
- Run local verification steps when available.
Recommendation

Limit the adapter to intended repo paths, keep work under version control, and require approval before running unfamiliar commands or writing to sensitive repositories.

What this means

If authorized, the agent may read or update GitHub issues, pull requests, and repository information.

Why it was flagged

The GitHub adapter may use repository credentials with read or write permissions. This is purpose-aligned for issue and PR coordination, and the artifact says scope should depend on the task.

Skill content
- Read/write issues.
- Read/write pull requests.
- Read repository metadata and files.
...
- Require GitHub credential with appropriate repository scopes.
Recommendation

Use least-privilege, repo-scoped credentials; prefer read-only access unless writes are needed; and review any issue or PR updates for public or shared repositories.

What this means

Project goals, assumptions, repo paths, decisions, and change history may persist in the hub and affect later work.

Why it was flagged

The skill uses a persistent hub file to guide later phases. That is central to its purpose, but inaccurate, stale, or overly sensitive hub content could influence future execution.

Skill content
Use this as the central state file (`alignment-hub.md`). ... `intent_snapshot` ... `assumptions` ... `adapters` ... `decision_log` ... `change_log`
Recommendation

Keep the hub project-local, avoid storing secrets, review it before major phases, and reset or archive it between unrelated tasks.