Game Theory

PassAudited by ClawScan on May 1, 2026.

Overview

This is an instruction-only game theory reference skill with no code, credentials, installation steps, or persistence, though it includes dual-use discussion of crypto attack tactics.

This appears safe to install as a markdown-only analytical reference skill. Treat its adversarial crypto and governance material as defensive education, and review outputs carefully if using it around real protocols, investments, governance votes, or public recommendations.

Findings (1)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may help analyze how governance attacks or social manipulation work, which is useful defensively but could be misused if prompted for real-world attack planning.

Why it was flagged

The reference material includes explicit attacker-oriented governance manipulation tactics. It is framed as being for defensive understanding and fits the skill’s stated purpose, but it is dual-use content that users should keep bounded.

Skill content
### For Attackers (to understand defense)
1. **Accumulate quietly:** Avoid detection
...
4. **Use social engineering:** Control narrative
5. **Extract incrementally:** Many small raids vs. one big one
Recommendation

Use the skill for defensive analysis, mechanism design, and risk review. Avoid using it to plan deception, governance manipulation, or exploit execution against real communities or protocols.