Commitment Escalation Architect
v1.0.0Design commitment escalation sequences and detect when consistency pressure is being used against you. Use this skill when planning onboarding sequences, act...
⭐ 0· 34·0 current·0 all-time
byHung Quoc To@quochungto
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (designing commitment-escalation sequences and detecting consistency pressure) matches the SKILL.md content. The skill is instruction-only, asks for document input and Read/Write tools only, and does not request unrelated binaries, credentials, or config paths.
Instruction Scope
Runtime instructions stay within the stated domain (mapping ladders, scoring amplifiers, designing sequences, defensive assessments). They do not instruct the agent to read system files, environment variables, or contact external endpoints. However, the guidance explicitly teaches manipulative techniques (progressive escalation, foot-in-the-door, lowball) and uses ethically sensitive examples (POW indoctrination, hazing). This is a content/ethics concern rather than a technical incoherence.
Install Mechanism
No install spec and no code files — nothing is downloaded or written to disk by the skill itself. This minimizes technical install risk.
Credentials
The skill requires no environment variables, credentials, or config paths. The declared tool requirements (Read, Write) are proportional to an instruction-only document-processing skill.
Persistence & Privilege
always is false and the skill does not request system-wide persistence or modifications to other skills. Autonomous invocation is allowed (platform default) but not combined with additional privileges.
Assessment
Technically coherent and low-risk: the skill is instruction-only, requests no secrets or installs, and confines its guidance to persuasion design. Important cautions: the content explicitly describes psychological manipulation tactics (including ethically fraught examples); consider whether you intend to use it for defensive/academic purposes or to influence real people. If deploying in an agent with autonomous execution, restrict that capability if you do not want the agent to compose or send persuasive sequences without human review. Do not feed the skill private personal data about targets, contact lists, or other sensitive information; ensure any use complies with legal, organizational, and platform policies and that you obtain appropriate consent. If you need greater assurance, request the author clarify intended use-cases and add explicit ethical guardrails (e.g., require human approval for any sequence that targets real people).Like a lobster shell, security has layers — review code before you run it.
activationvk978d45cbqka9t84z4hxm1qq8184tkm5behavioral-changevk978d45cbqka9t84z4hxm1qq8184tkm5bookforgevk978d45cbqka9t84z4hxm1qq8184tkm5commitmentvk978d45cbqka9t84z4hxm1qq8184tkm5consistencyvk978d45cbqka9t84z4hxm1qq8184tkm5conversion-funnelvk978d45cbqka9t84z4hxm1qq8184tkm5escalationvk978d45cbqka9t84z4hxm1qq8184tkm5foot-in-the-doorvk978d45cbqka9t84z4hxm1qq8184tkm5habit-formationvk978d45cbqka9t84z4hxm1qq8184tkm5inner-choicevk978d45cbqka9t84z4hxm1qq8184tkm5latestvk978d45cbqka9t84z4hxm1qq8184tkm5lowballvk978d45cbqka9t84z4hxm1qq8184tkm5onboardingvk978d45cbqka9t84z4hxm1qq8184tkm5persuasionvk978d45cbqka9t84z4hxm1qq8184tkm5self-imagevk978d45cbqka9t84z4hxm1qq8184tkm5user-engagementvk978d45cbqka9t84z4hxm1qq8184tkm5written-commitmentvk978d45cbqka9t84z4hxm1qq8184tkm5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📚 Clawdis
