Cron Worker Guardrails
PassAudited by ClawScan on May 1, 2026.
Overview
This is a clear instruction-only cron hardening checklist; the main thing to watch is that it advises creating and running scripts for unattended jobs.
Safe to install as an instruction-only checklist. Before using it on real cron/background jobs, review any generated scripts, confirm they are idempotent, keep secrets out of logs, and require explicit approval for destructive or persistent configuration changes.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A mistake in a generated script could run repeatedly in a cron/background job.
The skill recommends creating and running local scripts as part of cron hardening. This is central to the stated purpose and not hidden, but generated scripts can execute unattended if scheduled.
If parsing/multi-step logic is needed, write/run a small `tools/*.py` script.
Review any script before running it, keep paths and environment variables scoped, and test with a dry run before scheduling.
Once scheduled, a job may keep running without a human present, so bad assumptions can repeat over time.
The guidance is explicitly for unattended cron/background jobs. It does not create persistence itself and includes guardrails, but the target use case involves autonomous scheduled execution.
After changes, confirm: - the job runs end-to-end without human intervention
Only apply this to jobs you intentionally schedule, keep success/failure behavior clear, and require explicit approval for deletion, persistent config changes, or control-plane mutations.
