regenerative_intelligence

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Users may over-trust privacy, deletion, and non-surveillance claims that are not backed by a reviewed implementation.

Why it was flagged

This is an absolute privacy/security guarantee. The supplied registry context says the skill is instruction-only with no code or install mechanism, so the artifacts do not show how this guarantee is enforced.

Skill content
This guarantees that the memory system never receives a complete, re-identifiable, or extractive request.
Recommendation

Treat these statements as design intentions, not enforceable guarantees; require implementation details and platform controls before relying on them for sensitive data.

ConcernMedium Confidence
ASI06: Memory and Context Poisoning
What this means

If implemented by the agent or platform, user context could be retained and reused across tasks in ways the user cannot easily inspect from these artifacts.

Why it was flagged

The skill calls for persistent, potentially unlimited memory, but the reviewed artifacts do not define an actual storage location, user approval flow, retention boundary, or verification mechanism.

Skill content
Memory is stored in a structured database, not long context buffers... unlimited historical storage without context exhaustion.
Recommendation

Install only where memory behavior is explicit, user-controllable, auditable, and deletable; avoid using it with sensitive data unless those controls are verified.

ConcernHigh Confidence
ASI01: Agent Goal Hijack
What this means

The agent may stop directly helping or give vague answers without making clear that it has entered a protective mode.

Why it was flagged

This instructs the agent to change its response objective under suspected probing, potentially producing non-transparent low-utility answers instead of clearly stating a refusal or limitation.

Skill content
The system returns: Valid-sounding... Low-utility... Non-revealing... Circular or reflective responses
Recommendation

Require transparent stasis/refusal notices and user-visible reasons when the skill narrows or declines a request.

What this means

If a future implementation handles contacts or other identity data, users need to know exactly what is stored and for how long.

Why it was flagged

The skill contemplates handling identity-bearing data through a Trust Vault. This is purpose-aligned and privacy-bounded in the text, but no actual vault implementation is present in the artifacts.

Skill content
When execution requires identity... identity is handled through a separate execution-only layer... encrypted key-value store... ephemeral, permission-scoped pointers
Recommendation

Use only implementations that clearly document identity data scope, encryption, access controls, deletion behavior, and user consent.

What this means

Non-identifying patterns could be shared beyond the current interaction if an external implementation adds this layer.

Why it was flagged

The skill describes sharing derived patterns through a resonance layer. The text says data and origin are not exposed, but the actual recipients, protocol, permissions, and opt-in model are not implemented in the supplied artifacts.

Skill content
These patterns may be shared through the Resonance layer without exposing data or origin.
Recommendation

Require explicit opt-in, clear recipient boundaries, and reviewable sharing rules before enabling any resonance or inter-agent sharing.