Skylv Agent Constitution Guard

ReviewAudited by ClawScan on May 10, 2026.

Overview

Review recommended: this safety skill claims enforceable immutable guardrails, but the supplied artifacts are only instructions, reference a missing JavaScript implementation, and include broad sample permissions.

Use this skill only as a policy template unless the actual guardrail implementation is provided and reviewed. Do not assume it enforces immutable protections by itself, avoid sourcing a missing constitution.js from an unknown location, and tighten any real rules around local file access, escalation channels, and audit-log handling.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user might rely on the skill to prevent unsafe agent actions even though the provided artifacts do not show any mechanism that can enforce those rules.

Why it was flagged

The skill advertises enforceable protection, but the supplied package is instruction-only with no implementation or install mechanism, so the safety claim is not supported by the artifacts.

Skill content
This skill provides **enforceable, auditable, multi-layered** protection.
Recommendation

Treat this as design guidance only unless a reviewed implementation is supplied, and make the documentation clearly state what is and is not actually enforced.

What this means

The documented commands may fail, or users may be tempted to obtain or create an unreviewed implementation separately.

Why it was flagged

The instructions rely on a constitution.js runtime, but the artifact manifest contains only SKILL.md and no code files, leaving the referenced implementation absent from review.

Skill content
node constitution.js init --name "my-agent" --owner "admin@company.com"
Recommendation

Do not run or source a separate constitution.js unless its provenance and contents are reviewed; the package should include or clearly link to the intended implementation.

What this means

An agent configured this way could be allowed to read private local files beyond what a task requires.

Why it was flagged

The setup example permits broad local-file reading, which is sensitive if copied into a real agent policy without path limits, exclusions, or owner approval.

Skill content
--level mutable ... --action allow ... --scope "file_read" ... --description "Read any local file"
Recommendation

Use path-bounded read permissions, exclude secrets and credentials, and require owner approval for sensitive locations.

What this means

Audit logs could contain sensitive targets, payload summaries, or decision history if the implementation records them without redaction.

Why it was flagged

The skill documents persistent policy and audit storage, which is expected for this purpose but may retain sensitive action details.

Skill content
Creates `.constitution/` directory with default rules and audit log.
Recommendation

Define retention, access controls, and redaction rules for audit logs before using this in a sensitive environment.