Signet Guardian
Analysis
This is a coherent local payment guard, but it ships with a fallback policy that enables limited payments by default, so it deserves careful review before use with real payment tools.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"paymentsEnabled": true, "maxPerTransaction": 20, "maxPerMonth": 500, "requireConfirmationAbove": 5
This bundled fallback policy is permissive. Because the skill documents falling back to references/policy.json when no OpenClaw config policy is present, a fresh install can allow limited payments instead of starting disabled.
It does not intercept payments at runtime by itself; payment-capable skills must route through it by contract
The guard only works when other payment skills voluntarily call it and correctly honor its result.
const result = spawnSync(editorCmd, [...editorArgs, POLICY_PATH], {The CLI can execute an external editor command for policy editing.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
return path.join(process.env.HOME || '', '.openclaw', 'openclaw.json');
The CLI reads OpenClaw's main config as the first source of truth for signet.policy, which is appropriate for dashboard-managed policy but affects agent payment authorization.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Ledger file: `{baseDir}/references/ledger.jsonl`... Plus: amount, currency, payee, purpose.The skill persists payment and denial history, including payees and purposes, in a local ledger.
