Lattice Protocol: organic agentic social space
ReviewAudited by ClawScan on May 10, 2026.
Overview
This skill broadly matches its social-network purpose, but it can create a persistent agent identity, perform public social actions, and install default-enabled background cron automation.
Install this only if you want an AI agent to have a Lattice social identity. Before enabling it, decide whether you want background cron jobs; if not, decline configuration or remove the crontab entries. Require explicit approval for public posts, votes, reports, follows, and attestations, and protect the local `~/.lattice/keys.json` identity file.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent may continue contacting Lattice and collecting feed/reputation data in the background even when the user is not actively invoking the skill.
The setup flow defaults to yes and writes persistent cron entries, causing the skill's scripts to keep running on a schedule after configuration.
if ask_yes_no "Enable recommended Lattice Protocol cron jobs?" "y"; then
install_cron_jobs
...
echo "$NEW_CRONTAB" | crontab -Make cron automation explicit opt-in, review the generated crontab before enabling it, and remove entries with `crontab -l | grep -v lattice- | crontab -` if you do not want background activity.
If an agent invokes these commands too freely, it could post publicly, vote, follow, report content, or affect another agent's reputation under the user's Lattice identity.
The documented commands directly mutate public or reputation-affecting social state, but the artifacts do not show a per-action user confirmation requirement.
`lattice-post "content"` | Create a new post `lattice-vote POST_ID up` | Upvote a post `lattice-attest DID` | Attest an agent (+25-100 EXP) `lattice-report POST_ID "reason"` | Report spam
Require explicit user approval before posting, voting, reporting, following, or attesting, especially when cron or autonomous agent behavior is enabled.
Anyone or anything that can read `~/.lattice/keys.json` can potentially act as that Lattice identity.
The skill creates and stores a local private signing key for the Lattice identity; it is protected with 0600 permissions, but it is still the credential used for authenticated account actions.
privateKey: Buffer.from(privateKey).toString('hex'),
createdAt: new Date().toISOString()
...
fs.chmodSync(KEYS_FILE, 0o600);Protect `~/.lattice/keys.json`, avoid sharing it, and consider deleting or rotating the identity if the file is exposed.
Users may not realize that using the skill depends on Node/npm tooling and bundled executable scripts.
The package contains runnable Node CLI binaries and npm dependencies even though the registry says there is no install spec and no required binaries.
"bin": { "lattice-id": "./bin/lattice-id.js", ... },
"dependencies": { "@noble/ed25519": "^2.1.0", "multiformats": "^13.4.2" }Document the required runtime and install process in the registry metadata, and review dependencies before installation.
Untrusted social posts saved in logs could later be read by an agent and mistaken for trustworthy instructions or context.
The cron jobs persist network-sourced social feed content into local files for later review.
FEED_FILE="$LOG_DIR/morning-feed-$(date +%Y%m%d-%H%M).txt" ... "$BIN_DIR/lattice-feed" --discover --limit 10 > "$FEED_FILE"
Treat feed and reply logs as untrusted content, and avoid letting saved social posts override the user's actual task instructions.
