Constraint Engine

v1.3.1

Learn from consequences, not instructions — generate and enforce constraints from experience

0· 361·3 current·3 all-time
byLee Brown@leegitw

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for leegitw/constraint-engine.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Constraint Engine" (leegitw/constraint-engine) from ClawHub.
Skill page: https://clawhub.ai/leegitw/constraint-engine
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Config paths to check: .openclaw/constraint-engine.yaml, .claude/constraint-engine.yaml
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install constraint-engine

ClawHub CLI

Package manager switcher

npx clawhub@latest install constraint-engine
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (constraint generation/enforcement) align with what the skill requests and does: it reads local config, uses the agent model for checking/generation, and writes results to output/constraints/ and output/hooks/. The listed dependency on a failure-memory skill is consistent with generating constraints from observed failures.
Instruction Scope
SKILL.md is instruction-only and describes pre-action checks, generation, lifecycle, and circuit-breaker behavior. It explicitly restricts operations to the agent's trust boundary and workspace. The instructions reference only workspace paths and local config files (.openclaw/.claude); there are no directives to read unrelated system files or to transmit data to third-party services.
Install Mechanism
No install spec or code files are present; the SKILL.md shows example openclaw install commands but the skill itself is instruction-only. This is low-risk because nothing in the package will be written to disk or executed automatically by an installer.
Credentials
The skill requires no environment variables or external credentials. The only required config paths are project-local (.openclaw/constraint-engine.yaml and .claude/constraint-engine.yaml), which are proportionate to a behavior-enforcement skill.
Persistence & Privilege
always is false and autonomous invocation is allowed (platform default). The skill writes to its own workspace paths (output/constraints/, output/hooks/) which is expected. It does not request system-wide configuration changes or other skills' credentials.
Assessment
This skill appears internally consistent, but review these practical points before installing: 1) It will read the local config files (.openclaw/constraint-engine.yaml and .claude/constraint-engine.yaml) and will write constraints to output/constraints/ and output/hooks/ — inspect those configs and ensure you are comfortable with the skill modifying your workspace. 2) The SKILL.md references installing auxiliary skills (failure-memory, context-verifier); those are separate and could have their own requirements — review them before installing. 3) Although the skill states it does not call external APIs, it relies on your agent's model and internal trust boundary; if you want to limit autonomous changes, restrict agent-autonomy or require explicit user confirmation for enforcement/overrides. 4) If you plan to run openclaw install commands, be mindful that they fetch third-party skill code; review source repositories for any install-time behavior you might not want.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Config.openclaw/constraint-engine.yaml, .claude/constraint-engine.yaml
agenticvk9775bsnb80m32dnhhseatgf0983kzvjcircuit-breakervk9775bsnb80m32dnhhseatgf0983kzvjenforcementvk9775bsnb80m32dnhhseatgf0983kzvjguardrailsvk9775bsnb80m32dnhhseatgf0983kzvjlatestvk9775bsnb80m32dnhhseatgf0983kzvjpreventionvk9775bsnb80m32dnhhseatgf0983kzvjrulesvk9775bsnb80m32dnhhseatgf0983kzvjself-improvingvk9775bsnb80m32dnhhseatgf0983kzvjvalidationvk9775bsnb80m32dnhhseatgf0983kzvj
361downloads
0stars
5versions
Updated 1mo ago
v1.3.1
MIT-0

constraint-engine (制約)

Unified skill for constraint generation, pre-action checking, circuit breaker management, and constraint lifecycle. Consolidates 7 granular skills into a single enforcement system.

Trigger: 行動前∨閾値到達 (pre-action or threshold reached)

Source skills: constraint-generator, circuit-breaker, emergency-override, constraint-lifecycle, constraint-versioning, positive-framer (partial), contextual-injection (partial)

Installation

openclaw install leegitw/constraint-engine

Dependencies: leegitw/failure-memory (for eligibility data)

# Install with dependencies
openclaw install leegitw/context-verifier
openclaw install leegitw/failure-memory
openclaw install leegitw/constraint-engine

Standalone usage: Requires failure-memory for constraint generation from observations. For full lifecycle management, install the complete suite (see Neon Agentic Suite).

Data handling: This skill operates within your agent's trust boundary. When triggered, it uses your agent's configured model for constraint checking and generation. No external APIs or third-party services are called. Results are written to output/constraints/ in your workspace.

What This Solves

Instructions get ignored. Rules get forgotten. Documentation goes unread. This skill takes a different approach — constraints generated from actual failures:

  1. Generate constraints from observations that meet the eligibility threshold (R≥3 ∧ C≥2)
  2. Enforce constraints at runtime with a circuit breaker (CLOSED → OPEN → HALF-OPEN)
  3. Manage lifecycle from proposal through adoption to retirement

The insight: A constraint born from "this actually broke" carries more weight than "this might break." Consequences teach better than instructions.

Usage

/ce <sub-command> [arguments]

Sub-Commands

CommandCJKLogicTrigger
/ce check検査action→constraints[]→pass∨blockNext Steps (auto)
/ce generate生成eligible(obs)→constraintNext Steps (auto)
/ce status状態active[], circuit∈{CLOSED,OPEN,HALF}Explicit
/ce override上書constraint→bypass(temp), audit.log++Explicit
/ce lifecycle周期state∈{draft→active→retiring→retired}Explicit
/ce version版本constraint→v++, history.preserveExplicit
/ce threshold閾値user∨context→custom_thresholdExplicit

Arguments

/ce check

ArgumentRequiredDescription
actionYesAction to check against constraints
--severityNoMinimum severity to check: critical, important, minor (default: all)

/ce generate

ArgumentRequiredDescription
observationYesObservation ID or pattern to generate constraint from
--forceNoGenerate even if eligibility criteria not met

/ce status

ArgumentRequiredDescription
--circuitNoShow circuit breaker status only
--activeNoShow active constraints only

/ce override

ArgumentRequiredDescription
constraintYesConstraint ID to override
reasonYesReason for override (logged for audit)
--durationNoOverride duration (default: "session")

/ce lifecycle

ArgumentRequiredDescription
constraintYesConstraint ID
stateYesTarget state: draft, active, retiring, retired

/ce version

ArgumentRequiredDescription
constraintYesConstraint ID
--bumpNoVersion bump type: major, minor, patch (default: minor)

/ce threshold

ArgumentRequiredDescription
--RNoCustom recurrence threshold (default: 3)
--CNoCustom confirmation threshold (default: 2)
--resetNoReset to default thresholds

Configuration

Configuration is loaded from (in order of precedence):

  1. .openclaw/constraint-engine.yaml (OpenClaw standard)
  2. .claude/constraint-engine.yaml (Claude Code compatibility)
  3. Defaults (built-in)
# .openclaw/constraint-engine.yaml
thresholds:
  R: 3                       # Recurrence threshold (default: 3)
  C: 2                       # Confirmation threshold (default: 2)
  false_positive_max: 0.2    # Max D/(C+D) ratio (default: 0.2)
circuit_breaker:
  critical_threshold: 3      # Violations to trip for CRITICAL
  important_threshold: 5     # Violations to trip for IMPORTANT
  minor_threshold: 10        # Violations to trip for MINOR
  window_days: 30            # Violation window (default: 30 days)
lifecycle:
  review_reminder_days: 80   # Days before 90-day review to remind

Core Logic

Eligibility Criteria

Observation becomes eligible for constraint when:

R≥3 ∧ C≥2 ∧ D/(C+D)<0.2 ∧ sources≥2
CriterionMeaning
R≥3At least 3 recurrences
C≥2At least 2 human confirmations
D/(C+D)<0.2False positive rate under 20%
sources≥2Observed by at least 2 different sources

Positive Reframing

Constraints are automatically reframed positively:

NegativePositive
"Don't commit without tests""Always run tests before commit"
"Don't push to main directly""Always create PR for main changes"
"Don't deploy without review""Always get code review before deployment"
"Don't skip migrations""Always run database migrations before release"

Example: Code Review Constraint

[CHECK BLOCKED] deploy production
Constraint violated: CON-20260212-005
  "Always get code review approval before production deployment"
  Severity: CRITICAL

Action: Request review via /ro twin, then retry deployment.

Example: Deployment Gate Constraint

[CHECK PASSED] deploy staging
Active constraints checked: 3
  ✓ CON-20260210-001: Tests pass
  ✓ CON-20260211-002: Staging smoke test
  ✓ CON-20260212-003: Database migration verified
All constraints satisfied. Proceeding to staging.

Circuit Breaker States

StateMeaningBehavior
CLOSEDNormal operationConstraints enforced
OPENCircuit trippedBlock all related actions
HALF-OPENTesting recoveryAllow limited actions

Circuit Breaker Thresholds

SeverityThresholdWindow
CRITICAL3 violations30 days
IMPORTANT5 violations30 days
MINOR10 violations30 days

Constraint Lifecycle

draft → active → retiring → retired
  │        │         │
  └────────┴─────────┴── 90-day review gates

Output

/ce check output (pass)

[CHECK PASSED] git commit -m "feature"
Active constraints checked: 5
All constraints satisfied.

/ce check output (block)

[CHECK BLOCKED] git commit -m "feature"

Constraint violated: CON-20260210-001
  "Always run tests before commit"
  Severity: CRITICAL

Action: Run tests first, then retry commit.
Override: /ce override CON-20260210-001 "emergency hotfix"

/ce status output

=== Constraint Engine Status ===

Circuit Breaker: CLOSED (healthy)

Active Constraints (5):
- CON-20260210-001: Always run tests before commit [CRITICAL]
- CON-20260212-003: Always lint before commit [IMPORTANT]
- ...

Draft Constraints (2):
- CON-20260215-001: Pending approval

Violations (30d): 2

/ce generate output

[CONSTRAINT GENERATED]

From: OBS-20260210-003 (lint-before-commit)
ID: CON-20260215-001
Text: "Always run lint before commit"
Severity: IMPORTANT
Status: draft

Next: Review and approve with /ce lifecycle CON-20260215-001 active

Integration

  • Layer: Core
  • Depends on: failure-memory (for eligibility data)
  • Used by: governance (for constraint reviews), safety-checks (for enforcement)

Failure Modes

ConditionBehavior
Invalid sub-commandList available sub-commands
Constraint not foundError with suggestion to search
Ineligible observationShow missing criteria, suggest /fm status
Circuit OPENBlock action, show recovery guidance
Override without reasonRequire reason for audit trail

Next Steps

After invoking this skill:

ConditionAction
Constraint generatedAdd to output/constraints/draft/, notify user
Constraint activatedMove to output/constraints/active/
Action blockedLog to output/hooks/blocked.log, explain why
Circuit OPENSurface to user with recovery guidance
Override usedAudit log entry, temporary bypass only

Workspace Files

This skill reads/writes:

output/
├── constraints/
│   ├── draft/           # Pending constraints
│   │   └── CON-YYYYMMDD-XXX.md
│   ├── active/          # Enforced constraints
│   │   └── CON-YYYYMMDD-XXX.md
│   ├── retired/         # Historical constraints
│   │   └── CON-YYYYMMDD-XXX.md
│   └── metadata.json    # VFM scoring data
└── hooks/
    └── blocked.log      # Actions blocked by constraints

Security Considerations

What this skill accesses:

  • Configuration files in .openclaw/constraint-engine.yaml and .claude/constraint-engine.yaml
  • Observation data from failure-memory (via .learnings/ directory)
  • Its own output directories output/constraints/ and output/hooks/

What this skill does NOT access:

  • Files outside declared workspace paths
  • System environment variables
  • Network resources or external APIs

What this skill does NOT do:

  • Send data to external services
  • Execute arbitrary code
  • Modify files outside its workspace

Dependency note: This skill reads observation data from failure-memory skill's workspace (.learnings/). Install leegitw/failure-memory for full constraint generation functionality. Without failure-memory, constraint generation will have no observation data to process.

Audit logging: Override actions are logged to output/hooks/blocked.log for audit purposes. Logs are stored locally in the workspace only.

Acceptance Criteria

  • /ce check validates action against active constraints
  • /ce check blocks when constraint violated, shows reason
  • /ce generate creates constraint from eligible observation
  • /ce generate applies positive reframing
  • /ce status shows circuit breaker state and active constraints
  • /ce override creates temporary bypass with audit log
  • /ce lifecycle transitions constraint through states
  • /ce version increments constraint version preserving history
  • Circuit breaker trips at severity-appropriate thresholds
  • Workspace files follow documented structure

Consolidated from 7 skills as part of agentic skills consolidation (2026-02-15).

Comments

Loading comments...