# Send Compliance Audit to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "arc-compliance-audit",
    "name": "Compliance Audit",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/Trypto1019/arc-compliance-audit",
    "canonicalUrl": "https://clawhub.ai/Trypto1019/arc-compliance-audit",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/arc-compliance-audit",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=arc-compliance-audit",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md",
      "scripts/audit.py"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/arc-compliance-audit"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/arc-compliance-audit",
    "downloadUrl": "https://openagent3.xyz/downloads/arc-compliance-audit",
    "agentUrl": "https://openagent3.xyz/skills/arc-compliance-audit/agent",
    "manifestUrl": "https://openagent3.xyz/skills/arc-compliance-audit/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/arc-compliance-audit/agent.md"
  }
}
```
## Documentation

### Compliance Audit Trail

Immutable, tamper-evident audit logging for autonomous agents. Every action gets a hash-chained entry that can be verified for integrity.

### Why This Exists

Autonomous agents make decisions, execute skills, access data, and spend money without human oversight. When something goes wrong, you need to know exactly what happened. Current agent frameworks have no standard audit trail — this fills that gap.

### Log an action

python3 {baseDir}/scripts/audit.py log --action "skill_executed" --details '{"skill": "scanner", "target": "some-skill", "result": "clean"}'

### Log a decision

python3 {baseDir}/scripts/audit.py log --action "decision" --details '{"choice": "deploy v2", "reason": "all tests passed", "alternatives_considered": ["rollback", "hotfix"]}'

### Log data access

python3 {baseDir}/scripts/audit.py log --action "data_access" --details '{"resource": "api_key", "purpose": "moltbook_post", "accessor": "ghost_agent"}'

### Log a budget change

python3 {baseDir}/scripts/audit.py log --action "budget_change" --details '{"amount": -10.00, "merchant": "namecheap", "reason": "domain purchase", "balance_after": 190.00}'

### View recent entries

python3 {baseDir}/scripts/audit.py view --last 20

### View entries by action type

python3 {baseDir}/scripts/audit.py view --action skill_executed

### View entries in a time range

python3 {baseDir}/scripts/audit.py view --since "2026-02-15T00:00:00" --until "2026-02-16T00:00:00"

### Verify audit trail integrity

python3 {baseDir}/scripts/audit.py verify

### Export audit trail

python3 {baseDir}/scripts/audit.py export --format json > audit-export.json
python3 {baseDir}/scripts/audit.py export --format csv > audit-export.csv

### Generate compliance summary

python3 {baseDir}/scripts/audit.py summary --period day

### Entry Format

Each audit entry contains:

timestamp — ISO 8601, UTC
action — what happened (skill_executed, decision, data_access, budget_change, error, custom)
agent — which agent performed the action
details — structured JSON with action-specific data
hash — SHA-256 hash chaining previous entry's hash + current entry (tamper-evident)
sequence — monotonically increasing sequence number

### Integrity Verification

The audit trail is hash-chained: each entry includes a SHA-256 hash of the previous entry's hash concatenated with the current entry's data. If any entry is modified or deleted, the chain breaks and verify will report the exact point of tampering.

### Storage

Audit logs are stored in ~/.openclaw/audit/ as daily JSON files (audit-YYYY-MM-DD.json). This keeps individual files small while maintaining the full history.

### Use Cases

Incident response: What happened in the 5 minutes before the error?
Budget accountability: Show every dollar spent and why
Trust verification: Prove your agent hasn't been compromised
Enterprise compliance: Meet audit requirements for autonomous systems
Debugging: Trace the decision chain that led to an unexpected outcome
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: Trypto1019
- Version: 1.0.0
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-04-23T16:43:11.935Z
- Expires at: 2026-04-30T16:43:11.935Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/arc-compliance-audit)
- [Send to Agent page](https://openagent3.xyz/skills/arc-compliance-audit/agent)
- [JSON manifest](https://openagent3.xyz/skills/arc-compliance-audit/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/arc-compliance-audit/agent.md)
- [Download page](https://openagent3.xyz/downloads/arc-compliance-audit)