deterministic-controller
Analysis
This is a transparent docs-only automation template; it is not malicious, but arming it gives OpenClaw recurring file-updating, subagent orchestration, and optional Telegram logging.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
This file defines the only valid control loop. Execute exactly as written. Do not use prior chat context.
The template intentionally makes HEARTBEAT.md authoritative during triggered controller cycles, which is aligned with deterministic orchestration but can override normal session context if the user arms it.
Manager may run up to **2 concurrent subagents** for current sprint throughput ... Poll workers every 3 minutes and respawn/reassign if stalled.
The skill documents autonomous subagent orchestration and retry/reassignment behavior. This is central to the controller purpose and capped, but it can start or reassign work without per-step human approval once armed.
Create a cron job ... schedule: every 3 minutes ... Leave it **disabled** until you explicitly start.
The docs instruct the user to create persistent scheduled automation, but they clearly state it should be disabled by default and explicitly started by the operator.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`HEARTBEAT_TICK` (full context refresh): - `AGENTS.md`, `IDENTITY.md`, `USER.md`, `SOUL.md`, `MEMORY.md`, `memory/YYYY-MM-DD.md` ...
Heartbeat mode may read persistent profile and memory files. That is disclosed and bounded to named files, but those files can contain sensitive or stale context.
Send via `message(action=send, channel="telegram", target="<TELEGRAM_GROUP_ID>", message="<LINE>")`.
The controller can send control-plane logs to Telegram when the user configures a group ID. This egress is explicit and opt-in, but it moves operational data outside the local workspace.
