Wip File Guard

PassAudited by ClawScan on May 1, 2026.

Overview

The artifacts describe and implement a local guard hook that blocks certain overwrites of identity or memory files, with no evidence of hidden network access, credential use, or destructive behavior.

This skill appears safe for its stated purpose if you want a persistent local guard against accidental overwrites of identity and memory files. Before installing, verify the npm package/source, review the protected filename and path patterns, and know how to remove the hook if it blocks legitimate edits.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

After installation, the agent may be blocked from overwriting or making large replacements in files whose names or paths match the guard rules.

Why it was flagged

The hook intentionally denies some Write/Edit tool calls for protected files, directly controlling agent tool behavior.

Skill content
if (toolName === 'Write') { ... deny(`BLOCKED: Write tool on ${match} is not allowed. Use Edit to make specific changes.`);
Recommendation

Review the protected filenames, path patterns, and line-removal thresholds before enabling the hook, and adjust them if they are too broad for your workspace.

What this means

The guard remains active across relevant agent tool-use events until the hook/plugin configuration is removed.

Why it was flagged

The plugin registers a lifecycle hook that continues running before tool use once installed.

Skill content
"lifecycle": { "before_tool_use": "./guard.mjs" }
Recommendation

Install it only if you want persistent file-edit blocking, and keep track of where it is registered so you can disable it when needed.

What this means

The install path is understandable, but users should make sure the npm package and repository are the intended ones before installing.

Why it was flagged

The registry-level provenance fields do not identify a source or homepage, even though the included package files reference an npm package and GitHub repository.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the npm package name, publisher, and repository URL, especially because the displayed registry provenance is incomplete.

What this means

The local guard can inspect edit payload text for protected memory or identity files, although the artifacts show no storage or transmission of that content.

Why it was flagged

For Edit operations, the hook receives the old and new text snippets for protected files, which may include identity, memory, journal, or context content.

Skill content
const oldString = toolInput.old_string || ''; const newString = toolInput.new_string || '';
Recommendation

Use a trusted local installation and review the protected patterns if your memory or journal files contain especially sensitive content.