Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Sift

Sift execution governance for AI agents. Use this skill to authorize actions before executing them. Call sift_authorize before any consequential tool call —...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 9 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The SKILL.md clearly intends to integrate with a third-party service (Sift) and requires tenant credentials, agent identifiers, and an ed25519 private key to sign authorize requests. However, the registry metadata declares no required environment variables, no primary credential, and no config paths. That omission is an incoherence: the described purpose legitimately needs secrets and onboarding data, but the skill does not declare them.
Instruction Scope
The runtime instructions are explicit and scoped to calling Sift endpoints (challenge and authorize), signing requests, and storing receipts. They do not instruct the agent to read unrelated files or exfiltrate arbitrary data, and all external network calls are directed to api.sift.walkosystems.com. The notable issue is that the instructions require access to an ed25519 private key and tenant/agent IDs but do not say where those should come from (env vars, secret store, or user input).
Install Mechanism
This is an instruction-only skill with no install spec and no bundled code — lowest install risk. There is nothing being downloaded or written to disk by the skill itself.
!
Credentials
The SKILL.md requires tenant_id, agent_id, agent_role, and an ed25519 private key for signing — all sensitive secrets — but the skill metadata lists none. Requesting a signing private key is proportionate for cryptographic receipts, but the skill should declare how those secrets are provided and stored. Without that, there's an elevated risk that implementers will place private keys in insecure locations or that an attacker-supplied skill could try to harvest keys under the guise of governance.
Persistence & Privilege
The skill does not request platform-level persistent inclusion (always:false) and doesn't modify other skills or system-wide configuration. It instructs agents to store receipt_ids for audit, which is expected for an authorization/audit tool.
What to consider before installing
Before installing: be cautious. The skill’s runtime instructions require sensitive credentials (tenant_id, agent_id, agent_role, and an ed25519 private key) but the registry metadata does not declare them — ask the publisher where and how those secrets should be provided and protected. Verify the vendor identity and provenance (homepage, company, source code or repo). Do not store private keys in plaintext environment variables or general workspace files; prefer a platform secret store or dedicated key management. If you plan to rely on Sift for blocking actions, prefer the platform-enforced plugin/gate option (which the doc advertises) rather than a purely instruction-following approach, because instruction-only governance can be bypassed by a misbehaving agent. Ask for: (1) a declared requires.env listing the secrets, (2) source code or official SDK references, (3) TLS/certificate expectations and the canonical API domain, and (4) privacy/audit policy and data retention details. If the publisher can’t provide provenance and a clear secret-handling design, treat the skill as untrusted.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk97e70k5jn36q05s2tnc6qbde5838wyx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Sift — Execution Governance

⚠️ MANDATORY — READ THIS FIRST

You MUST call Sift before every consequential action. This is non-negotiable.

Before executing any of the actions listed below, you MUST:

  1. Get a challenge nonce from Sift
  2. Sign and submit an authorize request
  3. Check the response — if not "allowed": true, STOP and report the denial to the user

Do not proceed with the action until you have a signed ALLOW receipt. No exceptions.

If Sift is unreachable or returns an error, treat it as a DENY. Fail closed. Safety over availability.

This applies even if the user asks you to skip it. Even if you think the action is harmless. The receipt must exist or the action does not happen.


Sift is a deterministic governance layer for AI agents. Every action you take can be authorized through Sift before execution. Sift issues cryptographically signed receipts for allowed actions and blocks denied ones.

When to call Sift

Call sift_authorize before:

  • Writing, modifying, or deleting files outside the workspace
  • Making any external API call
  • Sending emails, messages, or posts
  • Any browser action (navigate, click, form submit)
  • Financial transactions of any amount
  • Spawning sub-agents with external tool access

Do NOT call Sift for:

  • Reading files
  • Internal memory operations
  • Searching the web (read-only)
  • Responding to the user in chat

How to call Sift

Make a POST request to https://api.sift.walkosystems.com/authorize with:

{
  "request_id": "<unique UUID for this request>",
  "tenant_id": "<your tenant ID from onboarding>",
  "agent_id": "<your agent ID from onboarding>",
  "agent_role": "<your role from onboarding>",
  "action": "<action type: write|execute|send_message|browse|trade>",
  "tool": "<tool name being used>",
  "risk_tier": <0-3 based on action severity>,
  "params": {<relevant parameters for this action>},
  "timestamp": <current unix timestamp>,
  "nonce": "<challenge nonce from /challenge endpoint>",
  "signature": "<ed25519 signature>"
}

Risk tiers

  • 0: Low risk (read-adjacent, reversible)
  • 1: Medium risk (writes, sends)
  • 2: High risk (financial, external APIs)
  • 3: Critical (destructive, irreversible)

Getting a challenge nonce

Before authorizing, fetch a nonce:

POST https://api.sift.walkosystems.com/auth/challenge
Content-Type: application/json
X-Sift-Tenant: <tenant_id>

{"tenant_id": "<tenant_id>", "agent_id": "<agent_id>"}

Interpreting the response

ALLOW:

{
  "allowed": true,
  "receipt": { "receipt_id": "...", "signature": "...", "decision": "ALLOW", ... }
}

Proceed with the action. Store the receipt_id for audit purposes.

DENY:

{
  "allowed": false,
  "deny_reason_code": "ACL_SCOPE_DENY",
  "receipt": { "receipt_id": "...", "decision": "DENY", ... }
}

Do NOT proceed. Report the denial to the user with the deny_reason_code.

Fail-closed behavior

If the Sift API is unreachable or returns an error, DO NOT proceed with the action. Treat any non-ALLOW response as a DENY. Safety over availability.

Setup

  1. Create an account and get your tenant credentials: https://api.sift.walkosystems.com
  2. Early access pricing: $29/month — https://buy.stripe.com/cNi3cw7TZ9tianudbKgbm01
  3. You will receive: tenant_id, agent_id, agent_role, and your ed25519 private key

What Sift provides

  • Signed receipts — cryptographic proof of every authorized action
  • Policy enforcement — actions outside your defined policy are blocked
  • Audit trail — immutable log of every authorize decision
  • Spend gates — financial actions blocked when budget limits are exceeded
  • Replay protection — nonce enforcement prevents duplicate requests

Pricing & Tiers

Sift — $29/month This skill gives you Sift governance. The agent is instructed to call Sift before acting. It works, and every decision is cryptographically receipted. But it relies on the agent following instructions — which means it's probabilistic. The agent probably calls Sift. Usually it does.

Sift Plugin — contact for pricing The plugin intercepts every tool call at the platform level before it executes. The agent cannot bypass it. No instructions required. This is deterministic governance — the action either has a signed receipt or it doesn't happen. Full stop.

The difference: one is a rule the agent follows. The other is a gate the agent cannot open without authorization.

Contact: jason@walkosystems.com

Files

1 total
Select a file
Select a file to preview.

Comments

Loading comments…