{
  "schemaVersion": "1.0",
  "item": {
    "slug": "an2b-warden-governance",
    "name": "War/Den Governance",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/jcools1977/an2b-warden-governance",
    "canonicalUrl": "https://clawhub.ai/jcools1977/an2b-warden-governance",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/an2b-warden-governance",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=an2b-warden-governance",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      ".gitignore",
      "clawhub.json",
      "pyproject.toml",
      "README.md",
      "SKILL.md",
      "UPGRADE.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/an2b-warden-governance"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/an2b-warden-governance",
    "agentPageUrl": "https://openagent3.xyz/skills/an2b-warden-governance/agent",
    "manifestUrl": "https://openagent3.xyz/skills/an2b-warden-governance/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/an2b-warden-governance/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "War/Den Governance Skill",
        "body": "ClawHub Package: an2b/warden-governance\nVersion: 1.0.0\nCategory: Governance & Security\nLicense: MIT"
      },
      {
        "title": "What This Skill Does",
        "body": "Every action your OpenClaw bot tries to take is evaluated by War/Den before it executes.\n\nYour Bot -> War/Den check -> ALLOW  -> action executes\n                          -> DENY   -> action blocked + logged\n                          -> REVIEW -> waits for your approval\n\nNo more deleted emails. No more data exfiltration. No more ungoverned agents.\n\nCommunity mode works with zero external dependencies. No API keys. No cloud.\nJust YAML policies, a local SQLite audit log, and a hash chain you can verify."
      },
      {
        "title": "From ClawHub (recommended)",
        "body": "openclaw skill install an2b/warden-governance"
      },
      {
        "title": "From pip",
        "body": "pip install warden-governance-skill\n\nBoth methods install to: ~/.openclaw/skills/warden-governance/\n\nOn successful install you'll see:\n\n🦞 War/Den governance active.\n   Your OpenClaw bot is now governed."
      },
      {
        "title": "Add to your OpenClaw config",
        "body": "skills:\n  - name: warden-governance\n    config:\n      SENTINEL_API_KEY: \"\"       # optional -- leave blank for community mode\n      ENGRAMPORT_API_KEY: \"\"     # optional -- leave blank for local memory\n      WARDEN_FAIL_OPEN: \"false\"  # block on governance failure (default)"
      },
      {
        "title": "Restart your bot",
        "body": "openclaw restart\n\nThat's it. Your bot is now governed."
      },
      {
        "title": "Hooks",
        "body": "This skill registers three OpenClaw hooks:\n\nHookPurposebefore_actionEvaluate every action against policy before executionafter_actionWrite action result to governed memoryon_errorLog errors to tamper-evident audit trail"
      },
      {
        "title": "Action Bridge",
        "body": "All 15 OpenClaw action types are mapped to War/Den governance types:\n\nOpenClaw ActionWar/Den TypeDefault Protectionemail.sendmessage.sendMonitoredemail.deletedata.writeRequires human reviewemail.readdata.readMonitoredfile.writedata.writeMonitoredfile.deletedata.writeRequires human reviewfile.readdata.readMonitoredbrowser.navigateapi.callMonitoredbrowser.clickapi.callMonitoredshell.executecode.executeBlocked in productionapi.callapi.callMonitoredcalendar.createdata.writeMonitoredcalendar.deletedata.writeRequires human reviewmessage.sendmessage.sendMonitoredcode.executecode.executeBlocked in productionpayment.createapi.callRequires human review"
      },
      {
        "title": "Policy Engine",
        "body": "Policies are YAML files evaluated in priority order:\n\npolicies:\n  - name: protect-email-delete\n    match:\n      action.type: data.write\n      action.data.openclaw_original: email.delete\n    decision: review\n    mode: enforce\n    priority: 1\n    active: true\n    reason: \"Email deletion requires human review.\"\n\nEvaluation rules:\n\nFilter to active policies only\nSort by priority ascending (lower number = higher priority)\nFirst match wins\nmode: monitor -- log but return ALLOW\nmode: enforce -- return the matched decision\nNo match -- default ALLOW"
      },
      {
        "title": "Pre-built Policy Packs",
        "body": "Load governance instantly with built-in packs:\n\nPackWhat It Doesbasic_safetyBlocks code execution in prod, monitors writes and API callsphi_guardDenies PHI access in dev, requires review for memory exportpayments_guardDenies payment actions in dev, requires review in prod"
      },
      {
        "title": "Audit Trail",
        "body": "Every governance decision is written to a tamper-evident SHA-256 hash chain:\n\nEvent N:  hash = SHA256(prev_hash + agent_id + action_type + decision + timestamp)\nEvent N+1: prev_hash = Event N hash\n\nVerify the chain at any time:\n\nvalid, bad_event_id = audit_log.verify_chain()"
      },
      {
        "title": "Decision Cache",
        "body": "ALLOW decisions are cached for 5 minutes (configurable). DENY and REVIEW are never cached -- they always hit the governance engine fresh."
      },
      {
        "title": "Community vs Enterprise",
        "body": "FeatureCommunity (Free)EnterprisePolicy enforcementLocal YAMLSentinel_OS cloudAudit trailLocal SQLite + hash chainCloud + signed PDFMemory storageLocal SQLiteEngramPort cloud (MandelDB)Memory searchText search (LIKE)Vector search (3072-dim)SynthesisBasic recallEidetic AI synthesisCross-bot memory--Orchestra multi-agentMulti-namespace3 maxUnlimitedCompliance export--SOC2/HIPAA PDFCryptographic provenanceLocal hash chainAEGIS (SHA-256 + RSA)DependenciesZerosentinel-client, engramport-langchain"
      },
      {
        "title": "Mode Matrix",
        "body": "SENTINEL_API_KEYENGRAMPORT_API_KEYMode----Full CommunitySet--Governed Community--SetMemory EnterpriseSetSetFull Enterprise\n\nAll four modes work with zero code changes. Just environment variables."
      },
      {
        "title": "Sentinel_OS (Governance)",
        "body": "Set SENTINEL_API_KEY to upgrade governance from local YAML to Sentinel_OS cloud:\n\nReal-time policy evaluation via /api/v1/check\nPre-flight checks via /api/v1/check (read-only, no side effects)\nAction logging via /api/v1/ingest with hash chain integrity\nRun management, alerting, and AI-powered insights\nPython and Node.js SDKs\nRate limiting: 2000 checks/min, 1000 ingests/min per API key\n\nGet your key at getsentinelos.com"
      },
      {
        "title": "EngramPort (Memory via MandelDB)",
        "body": "Set ENGRAMPORT_API_KEY to upgrade memory from local SQLite to EngramPort cloud:\n\n5 endpoints: /register, /remember, /recall, /reflect, /stats\n3072-dimensional OpenAI embeddings via Pinecone\nAEGIS cryptographic provenance (SHA-256 + RSA signature per memory)\nNamespace-isolated storage (bot:{slug}:{uid})\nEidetic cross-memory pattern synthesis via GPT-4o-mini\nMulti-agent orchestration with EngramPortOrchestra\nBackground synthesis with DreamState\nLangChain drop-in integration\n\nAPI keys use format ek_bot_* with SHA-256 hashed storage.\n\nGet your key at engram.eideticlab.com"
      },
      {
        "title": "Configuration",
        "body": "VariableRequiredDefaultDescriptionSENTINEL_API_KEYNo\"\"Sentinel_OS key. Blank = community governanceENGRAMPORT_API_KEYNo\"\"EngramPort key. Blank = local memoryWARDEN_FAIL_OPENNofalseAllow on governance failureWARDEN_AGENT_IDNoopenclaw-agentBot identifierWARDEN_POLICY_FILENobuilt-inPath to custom YAML policy fileWARDEN_POLICY_PACKSNo\"\"Comma-separated pack namesWARDEN_MEMORY_DBNo~/.warden/memory.dbLocal memory pathWARDEN_AUDIT_DBNo~/.warden/audit.dbLocal audit log pathWARDEN_CACHE_TTLNo300ALLOW cache TTL in seconds"
      },
      {
        "title": "Fail-Open Behavior",
        "body": "WARDEN_FAIL_OPENWar/Den reachableWar/Den unreachablefalse (default)Normal governanceAction BLOCKEDtrueNormal governanceAction ALLOWED + warning\n\nDefault is false because a governance failure should never silently allow dangerous actions."
      },
      {
        "title": "Test Proof",
        "body": "This skill ships with a comprehensive test suite. Run it:\n\npython -m pytest tests/ -v\n\nKey test: The Meta inbox test simulates the exact incident where an OpenClaw agent deleted 200 emails. With War/Den, all 200 are blocked:\n\ndef test_meta_researcher_inbox_protection(self, tmp_path):\n    \"\"\"Simulate the exact Meta inbox incident. All 200 emails blocked.\"\"\"\n    skill = _make_skill(tmp_path, WARDEN_POLICY_FILE=policy_path)\n    blocked = 0\n    for i in range(200):\n        result = skill.before_action(\n            {\"type\": \"email.delete\", \"data\": {\"email_id\": f\"msg_{i}\"}},\n            {\"agent_id\": \"meta-researcher-bot\", \"env\": \"prod\"},\n        )\n        if not result[\"proceed\"]:\n            blocked += 1\n    assert blocked == 200"
      },
      {
        "title": "Skill Files",
        "body": "warden-governance-skill/\n├── SKILL.md                          # This file (ClawHub primary)\n├── clawhub.json                      # ClawHub registry metadata\n├── README.md                         # Full documentation\n├── pyproject.toml                    # Python package config\n├── policies/\n│   ├── openclaw_default.yaml         # Default governance policies\n│   └── policy_packs.py              # Pre-built policy packs\n├── warden_governance/\n│   ├── __init__.py\n│   ├── skill.py                      # Main skill class (hooks)\n│   ├── action_bridge.py              # OpenClaw <-> War/Den translation\n│   ├── policy_engine.py              # Community policy engine\n│   ├── audit_log.py                  # SHA-256 hash chain audit\n│   ├── memory_client.py              # Governed memory operations\n│   ├── local_store.py                # Local SQLite memory\n│   ├── sentinel_client.py            # Enterprise Sentinel_OS client\n│   ├── engramport_client.py          # Enterprise EngramPort client\n│   ├── upgrade_manager.py            # Mode detection + banner\n│   ├── health_check.py               # Enterprise health validation\n│   └── settings.py                   # Configuration\n└── tests/\n    ├── __init__.py\n    ├── test_skill.py                 # Skill + Meta inbox tests\n    ├── test_policy_engine.py         # Policy engine tests\n    ├── test_audit_log.py             # Audit trail tests\n    ├── test_action_bridge.py         # Action bridge tests\n    ├── test_memory.py                # Memory client tests\n    └── test_enterprise.py            # Enterprise upgrade tests\n\nBuilt on Sentinel_OS and EngramPort by AN2B Technologies\n\nThe lobster protects the inbox."
      }
    ],
    "body": "War/Den Governance Skill\n\nClawHub Package: an2b/warden-governance Version: 1.0.0 Category: Governance & Security License: MIT\n\nWhat This Skill Does\n\nEvery action your OpenClaw bot tries to take is evaluated by War/Den before it executes.\n\nYour Bot -> War/Den check -> ALLOW  -> action executes\n                          -> DENY   -> action blocked + logged\n                          -> REVIEW -> waits for your approval\n\n\nNo more deleted emails. No more data exfiltration. No more ungoverned agents.\n\nCommunity mode works with zero external dependencies. No API keys. No cloud. Just YAML policies, a local SQLite audit log, and a hash chain you can verify.\n\nInstall\nFrom ClawHub (recommended)\nopenclaw skill install an2b/warden-governance\n\nFrom pip\npip install warden-governance-skill\n\n\nBoth methods install to: ~/.openclaw/skills/warden-governance/\n\nOn successful install you'll see:\n\n🦞 War/Den governance active.\n   Your OpenClaw bot is now governed.\n\nAdd to your OpenClaw config\nskills:\n  - name: warden-governance\n    config:\n      SENTINEL_API_KEY: \"\"       # optional -- leave blank for community mode\n      ENGRAMPORT_API_KEY: \"\"     # optional -- leave blank for local memory\n      WARDEN_FAIL_OPEN: \"false\"  # block on governance failure (default)\n\nRestart your bot\nopenclaw restart\n\n\nThat's it. Your bot is now governed.\n\nHow It Works\nHooks\n\nThis skill registers three OpenClaw hooks:\n\nHook\tPurpose\nbefore_action\tEvaluate every action against policy before execution\nafter_action\tWrite action result to governed memory\non_error\tLog errors to tamper-evident audit trail\nAction Bridge\n\nAll 15 OpenClaw action types are mapped to War/Den governance types:\n\nOpenClaw Action\tWar/Den Type\tDefault Protection\nemail.send\tmessage.send\tMonitored\nemail.delete\tdata.write\tRequires human review\nemail.read\tdata.read\tMonitored\nfile.write\tdata.write\tMonitored\nfile.delete\tdata.write\tRequires human review\nfile.read\tdata.read\tMonitored\nbrowser.navigate\tapi.call\tMonitored\nbrowser.click\tapi.call\tMonitored\nshell.execute\tcode.execute\tBlocked in production\napi.call\tapi.call\tMonitored\ncalendar.create\tdata.write\tMonitored\ncalendar.delete\tdata.write\tRequires human review\nmessage.send\tmessage.send\tMonitored\ncode.execute\tcode.execute\tBlocked in production\npayment.create\tapi.call\tRequires human review\nPolicy Engine\n\nPolicies are YAML files evaluated in priority order:\n\npolicies:\n  - name: protect-email-delete\n    match:\n      action.type: data.write\n      action.data.openclaw_original: email.delete\n    decision: review\n    mode: enforce\n    priority: 1\n    active: true\n    reason: \"Email deletion requires human review.\"\n\n\nEvaluation rules:\n\nFilter to active policies only\nSort by priority ascending (lower number = higher priority)\nFirst match wins\nmode: monitor -- log but return ALLOW\nmode: enforce -- return the matched decision\nNo match -- default ALLOW\nPre-built Policy Packs\n\nLoad governance instantly with built-in packs:\n\nPack\tWhat It Does\nbasic_safety\tBlocks code execution in prod, monitors writes and API calls\nphi_guard\tDenies PHI access in dev, requires review for memory export\npayments_guard\tDenies payment actions in dev, requires review in prod\nAudit Trail\n\nEvery governance decision is written to a tamper-evident SHA-256 hash chain:\n\nEvent N:  hash = SHA256(prev_hash + agent_id + action_type + decision + timestamp)\nEvent N+1: prev_hash = Event N hash\n\n\nVerify the chain at any time:\n\nvalid, bad_event_id = audit_log.verify_chain()\n\nDecision Cache\n\nALLOW decisions are cached for 5 minutes (configurable). DENY and REVIEW are never cached -- they always hit the governance engine fresh.\n\nCommunity vs Enterprise\nFeature\tCommunity (Free)\tEnterprise\nPolicy enforcement\tLocal YAML\tSentinel_OS cloud\nAudit trail\tLocal SQLite + hash chain\tCloud + signed PDF\nMemory storage\tLocal SQLite\tEngramPort cloud (MandelDB)\nMemory search\tText search (LIKE)\tVector search (3072-dim)\nSynthesis\tBasic recall\tEidetic AI synthesis\nCross-bot memory\t--\tOrchestra multi-agent\nMulti-namespace\t3 max\tUnlimited\nCompliance export\t--\tSOC2/HIPAA PDF\nCryptographic provenance\tLocal hash chain\tAEGIS (SHA-256 + RSA)\nDependencies\tZero\tsentinel-client, engramport-langchain\nMode Matrix\nSENTINEL_API_KEY\tENGRAMPORT_API_KEY\tMode\n--\t--\tFull Community\nSet\t--\tGoverned Community\n--\tSet\tMemory Enterprise\nSet\tSet\tFull Enterprise\n\nAll four modes work with zero code changes. Just environment variables.\n\nEnterprise Upgrade Path\nSentinel_OS (Governance)\n\nSet SENTINEL_API_KEY to upgrade governance from local YAML to Sentinel_OS cloud:\n\nReal-time policy evaluation via /api/v1/check\nPre-flight checks via /api/v1/check (read-only, no side effects)\nAction logging via /api/v1/ingest with hash chain integrity\nRun management, alerting, and AI-powered insights\nPython and Node.js SDKs\nRate limiting: 2000 checks/min, 1000 ingests/min per API key\n\nGet your key at getsentinelos.com\n\nEngramPort (Memory via MandelDB)\n\nSet ENGRAMPORT_API_KEY to upgrade memory from local SQLite to EngramPort cloud:\n\n5 endpoints: /register, /remember, /recall, /reflect, /stats\n3072-dimensional OpenAI embeddings via Pinecone\nAEGIS cryptographic provenance (SHA-256 + RSA signature per memory)\nNamespace-isolated storage (bot:{slug}:{uid})\nEidetic cross-memory pattern synthesis via GPT-4o-mini\nMulti-agent orchestration with EngramPortOrchestra\nBackground synthesis with DreamState\nLangChain drop-in integration\n\nAPI keys use format ek_bot_* with SHA-256 hashed storage.\n\nGet your key at engram.eideticlab.com\n\nConfiguration\nVariable\tRequired\tDefault\tDescription\nSENTINEL_API_KEY\tNo\t\"\"\tSentinel_OS key. Blank = community governance\nENGRAMPORT_API_KEY\tNo\t\"\"\tEngramPort key. Blank = local memory\nWARDEN_FAIL_OPEN\tNo\tfalse\tAllow on governance failure\nWARDEN_AGENT_ID\tNo\topenclaw-agent\tBot identifier\nWARDEN_POLICY_FILE\tNo\tbuilt-in\tPath to custom YAML policy file\nWARDEN_POLICY_PACKS\tNo\t\"\"\tComma-separated pack names\nWARDEN_MEMORY_DB\tNo\t~/.warden/memory.db\tLocal memory path\nWARDEN_AUDIT_DB\tNo\t~/.warden/audit.db\tLocal audit log path\nWARDEN_CACHE_TTL\tNo\t300\tALLOW cache TTL in seconds\nFail-Open Behavior\nWARDEN_FAIL_OPEN\tWar/Den reachable\tWar/Den unreachable\nfalse (default)\tNormal governance\tAction BLOCKED\ntrue\tNormal governance\tAction ALLOWED + warning\n\nDefault is false because a governance failure should never silently allow dangerous actions.\n\nTest Proof\n\nThis skill ships with a comprehensive test suite. Run it:\n\npython -m pytest tests/ -v\n\n\nKey test: The Meta inbox test simulates the exact incident where an OpenClaw agent deleted 200 emails. With War/Den, all 200 are blocked:\n\ndef test_meta_researcher_inbox_protection(self, tmp_path):\n    \"\"\"Simulate the exact Meta inbox incident. All 200 emails blocked.\"\"\"\n    skill = _make_skill(tmp_path, WARDEN_POLICY_FILE=policy_path)\n    blocked = 0\n    for i in range(200):\n        result = skill.before_action(\n            {\"type\": \"email.delete\", \"data\": {\"email_id\": f\"msg_{i}\"}},\n            {\"agent_id\": \"meta-researcher-bot\", \"env\": \"prod\"},\n        )\n        if not result[\"proceed\"]:\n            blocked += 1\n    assert blocked == 200\n\nSkill Files\nwarden-governance-skill/\n├── SKILL.md                          # This file (ClawHub primary)\n├── clawhub.json                      # ClawHub registry metadata\n├── README.md                         # Full documentation\n├── pyproject.toml                    # Python package config\n├── policies/\n│   ├── openclaw_default.yaml         # Default governance policies\n│   └── policy_packs.py              # Pre-built policy packs\n├── warden_governance/\n│   ├── __init__.py\n│   ├── skill.py                      # Main skill class (hooks)\n│   ├── action_bridge.py              # OpenClaw <-> War/Den translation\n│   ├── policy_engine.py              # Community policy engine\n│   ├── audit_log.py                  # SHA-256 hash chain audit\n│   ├── memory_client.py              # Governed memory operations\n│   ├── local_store.py                # Local SQLite memory\n│   ├── sentinel_client.py            # Enterprise Sentinel_OS client\n│   ├── engramport_client.py          # Enterprise EngramPort client\n│   ├── upgrade_manager.py            # Mode detection + banner\n│   ├── health_check.py               # Enterprise health validation\n│   └── settings.py                   # Configuration\n└── tests/\n    ├── __init__.py\n    ├── test_skill.py                 # Skill + Meta inbox tests\n    ├── test_policy_engine.py         # Policy engine tests\n    ├── test_audit_log.py             # Audit trail tests\n    ├── test_action_bridge.py         # Action bridge tests\n    ├── test_memory.py                # Memory client tests\n    └── test_enterprise.py            # Enterprise upgrade tests\n\n\nBuilt on Sentinel_OS and EngramPort by AN2B Technologies\n\nThe lobster protects the inbox."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/jcools1977/an2b-warden-governance",
    "publisherUrl": "https://clawhub.ai/jcools1977/an2b-warden-governance",
    "owner": "jcools1977",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/an2b-warden-governance",
    "downloadUrl": "https://openagent3.xyz/downloads/an2b-warden-governance",
    "agentUrl": "https://openagent3.xyz/skills/an2b-warden-governance/agent",
    "manifestUrl": "https://openagent3.xyz/skills/an2b-warden-governance/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/an2b-warden-governance/agent.md"
  }
}