Self Improver Lite
Analysis
This skill is coherent but should be reviewed because it allows automatic session cleanup, service restarts, and agent configuration changes without concrete bounds or explicit approval.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Apply only low-risk fixes automatically. ... Auto-Allowed Changes ... Session cleanup ... Gateway restart ... Context window/maxTokens tuning ... Fallback chain reordering
The skill explicitly authorizes automatic changes that can delete session state, restart the gateway, and alter agent/model behavior, but does not define precise limits or require user confirmation for those actions.
systemctl is-active openclaw-gateway ollama journalctl -u openclaw-gateway -n 120 --no-pager
The skill relies on host administration tools, while the provided metadata declares no required binaries or install requirements. This is not hidden code, but users should notice the dependency gap.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
systemctl is-active openclaw-gateway ollama journalctl -u openclaw-gateway -n 120 --no-pager
The skill expects local authority to inspect OpenClaw/Ollama services and read service logs; that is aligned with maintenance, but it is still privileged operational access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
journalctl -u openclaw-gateway -n 120 --no-pager ... Record summary and next actions. ... Never expose secrets in reports.
The skill reads recent service logs and records summaries. That is purpose-aligned and includes a secret-exposure guardrail, but service logs and summaries may contain sensitive operational details.
