Skylv Agent Constitution Guard

AdvisoryAudited by Static analysis on May 1, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user might rely on the skill to prevent unsafe agent actions even though the provided artifacts do not show any mechanism that can enforce those rules.

Why it was flagged

The skill advertises enforceable protection, but the supplied package is instruction-only with no implementation or install mechanism, so the safety claim is not supported by the artifacts.

Skill content
This skill provides **enforceable, auditable, multi-layered** protection.
Recommendation

Treat this as design guidance only unless a reviewed implementation is supplied, and make the documentation clearly state what is and is not actually enforced.

What this means

The documented commands may fail, or users may be tempted to obtain or create an unreviewed implementation separately.

Why it was flagged

The instructions rely on a constitution.js runtime, but the artifact manifest contains only SKILL.md and no code files, leaving the referenced implementation absent from review.

Skill content
node constitution.js init --name "my-agent" --owner "admin@company.com"
Recommendation

Do not run or source a separate constitution.js unless its provenance and contents are reviewed; the package should include or clearly link to the intended implementation.

What this means

An agent configured this way could be allowed to read private local files beyond what a task requires.

Why it was flagged

The setup example permits broad local-file reading, which is sensitive if copied into a real agent policy without path limits, exclusions, or owner approval.

Skill content
--level mutable ... --action allow ... --scope "file_read" ... --description "Read any local file"
Recommendation

Use path-bounded read permissions, exclude secrets and credentials, and require owner approval for sensitive locations.

What this means

Audit logs could contain sensitive targets, payload summaries, or decision history if the implementation records them without redaction.

Why it was flagged

The skill documents persistent policy and audit storage, which is expected for this purpose but may retain sensitive action details.

Skill content
Creates `.constitution/` directory with default rules and audit log.
Recommendation

Define retention, access controls, and redaction rules for audit logs before using this in a sensitive environment.