Claw Runaway Loop Detector
v1.0.0Detects potential infinite loops and runaway token usage risks in Claw AI workflows by analyzing retry, recursion, and termination conditions.
⭐ 1· 186·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description claim to detect runaway loops in Claw workflows; the SKILL.md contains only analysis instructions for that exact task and does not request unrelated capabilities or credentials.
Instruction Scope
Runtime instructions are limited to analyzing provided workflows/prompts for loop triggers, termination conditions, retries, and estimating token amplification. The SKILL.md does not instruct the agent to read system files, environment variables, or transmit data to external endpoints beyond normal model invocation.
Install Mechanism
No install spec and no code files — instruction-only skill. Nothing is written to disk or downloaded as part of the skill.
Credentials
No required environment variables, credentials, or config paths are declared or referenced in the instructions; requested access is proportionate to an analysis-only tool.
Persistence & Privilege
Flags indicate default behavior (not always:true). The skill does not request persistent system-wide changes or access to other skills' configurations.
Assessment
This is an instruction-only analyzer and appears coherent with its purpose. Before using it, avoid pasting secrets or private credentials into the workflow you submit for analysis because the content will be processed by the agent/model. Treat its findings as advisory — it will suggest safeguards but will not automatically enforce them. If you need automated enforcement (e.g., runtime token caps or circuit breakers), use platform-level controls or instrumented code in addition to this analyzer. If you want stronger assurance about what the skill does with your data, ask the publisher for source code or a hosted implementation detail; absence of install code here means the analysis logic is entirely driven by the SKILL.md and the model invocation context.Like a lobster shell, security has layers — review code before you run it.
agentsvk972f5tffan135gdw7trzwjcen830s81ai costvk972f5tffan135gdw7trzwjcen830s81automationvk972f5tffan135gdw7trzwjcen830s81clawvk972f5tffan135gdw7trzwjcen830s81latestvk972f5tffan135gdw7trzwjcen830s81loopvk972f5tffan135gdw7trzwjcen830s81tokenvk972f5tffan135gdw7trzwjcen830s81
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
