governance-guard

Structural authority separation for autonomous agent actions. Three-phase governance pipeline: PROPOSE, DECIDE, PROMOTE. No action is both proposed and approved by the same computational pathway.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "governance-guard" with this command: npx skills add MetaCortex Dynamics LLC/governance-guard

governance-guard

Governance guard enforces structural authority separation on all agent actions through a PROPOSE-DECIDE-PROMOTE pipeline.

When to activate

Before performing any write, execute, network, create, or delete action. The governance pipeline MUST be invoked before the action executes. Read actions may also be governed under standard or strict policies.

How to use

1. Full pipeline (recommended)

Run the complete PROPOSE → DECIDE → PROMOTE pipeline in a single call:

npx tsx scripts/governance.ts pipeline '<intent-json>' --policy policies/standard.yaml

The intent JSON must include:

  • skill: skill identifier
  • tool: tool/function being invoked
  • model: LLM model name
  • actionType: one of read, write, execute, network, create, delete
  • target: resource being acted upon
  • parameters: tool parameters (object)
  • dataScope: data categories accessed (array, e.g. ["personal", "financial"])
  • conversationId: current conversation ID
  • messageId: current message ID
  • userInstruction: the user message that triggered this action

2. Handle the verdict

The pipeline returns a JSON response:

  • If "governance": "approved" — proceed with the action
  • If "governance": "deny" — do NOT proceed; inform the user with the reason
  • If "governance": "escalate" — present the action to the user for approval:
Action requires your approval:
  Skill: <skill>
  Action: <actionType> on <target>
  Reason: <reason>
Reply APPROVE or DENY

Then resolve:

npx tsx scripts/governance.ts resolve-escalation <intent-id> approve
# or
npx tsx scripts/governance.ts resolve-escalation <intent-id> deny

3. Audit decisions

npx tsx scripts/governance.ts audit --last 10

Policy presets

PresetDefaultDescription
minimalapproveBlocks only credentials and destructive commands. Lowest friction.
standarddenyAllows common ops, escalates network and data access. Recommended.
strictdenyReads only. Everything else requires explicit approval. Maximum safety.

Fail-closed guarantee

If any error occurs during governance evaluation, the default verdict is DENY. Missing policy files result in DENY ALL. This is by design. The system fails safe, never open.

Configuration

Governance data is stored in ~/.openclaw/governance/:

  • policy.yaml — active policy file
  • witness.jsonl — append-only, hash-chained audit log

Verify witness chain

npx tsx scripts/governance.ts verify

Any tampering with historical records is detected by recomputing the hash chain from genesis.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Kevros

Precision decisioning, agentic trust, and verifiable identity for autonomous agents

Registry SourceRecently Updated
0240
Profile unavailable
Security

AgentMesh Governance

AI agent governance, trust scoring, and policy enforcement powered by AgentMesh. Activate when: (1) user wants to enforce token limits, tool restrictions, or...

Registry SourceRecently Updated
0492
Profile unavailable
Security

Agent Self Assessment

Comprehensive compliance and security self-assessment for AI agents. 10-check framework producing a structured threat model + compliance report with RED/AMBE...

Registry SourceRecently Updated
0496
Profile unavailable