# Send governance-guard to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "governance-guard",
    "name": "governance-guard",
    "source": "tencent",
    "type": "skill",
    "category": "其他",
    "sourceUrl": "https://clawhub.ai/devongenerally-png/governance-guard",
    "canonicalUrl": "https://clawhub.ai/devongenerally-png/governance-guard",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/governance-guard",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=governance-guard",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "package-lock.json",
      "package.json",
      "policies/minimal.yaml",
      "policies/standard.yaml",
      "policies/strict.yaml",
      "README.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/governance-guard"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/governance-guard",
    "downloadUrl": "https://openagent3.xyz/downloads/governance-guard",
    "agentUrl": "https://openagent3.xyz/skills/governance-guard/agent",
    "manifestUrl": "https://openagent3.xyz/skills/governance-guard/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/governance-guard/agent.md"
  }
}
```
## Documentation

### governance-guard

Governance guard enforces structural authority separation on all agent actions through a PROPOSE-DECIDE-PROMOTE pipeline.

### When to activate

Before performing any write, execute, network, create, or delete action. The governance pipeline MUST be invoked before the action executes. Read actions may also be governed under standard or strict policies.

### 1. Full pipeline (recommended)

Run the complete PROPOSE → DECIDE → PROMOTE pipeline in a single call:

npx tsx scripts/governance.ts pipeline '<intent-json>' --policy policies/standard.yaml

The intent JSON must include:

skill: skill identifier
tool: tool/function being invoked
model: LLM model name
actionType: one of read, write, execute, network, create, delete
target: resource being acted upon
parameters: tool parameters (object)
dataScope: data categories accessed (array, e.g. ["personal", "financial"])
conversationId: current conversation ID
messageId: current message ID
userInstruction: the user message that triggered this action

### 2. Handle the verdict

The pipeline returns a JSON response:

If "governance": "approved" — proceed with the action
If "governance": "deny" — do NOT proceed; inform the user with the reason
If "governance": "escalate" — present the action to the user for approval:

Action requires your approval:
  Skill: <skill>
  Action: <actionType> on <target>
  Reason: <reason>
Reply APPROVE or DENY

Then resolve:

npx tsx scripts/governance.ts resolve-escalation <intent-id> approve
# or
npx tsx scripts/governance.ts resolve-escalation <intent-id> deny

### 3. Audit decisions

npx tsx scripts/governance.ts audit --last 10

### Policy presets

PresetDefaultDescriptionminimalapproveBlocks only credentials and destructive commands. Lowest friction.standarddenyAllows common ops, escalates network and data access. Recommended.strictdenyReads only. Everything else requires explicit approval. Maximum safety.

### Fail-closed guarantee

If any error occurs during governance evaluation, the default verdict is DENY. Missing policy files result in DENY ALL. This is by design. The system fails safe, never open.

### Configuration

Governance data is stored in ~/.openclaw/governance/:

policy.yaml — active policy file
witness.jsonl — append-only, hash-chained audit log

### Verify witness chain

npx tsx scripts/governance.ts verify

Any tampering with historical records is detected by recomputing the hash chain from genesis.
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: devongenerally-png
- Version: 0.1.0
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-04-23T16:43:11.935Z
- Expires at: 2026-04-30T16:43:11.935Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/governance-guard)
- [Send to Agent page](https://openagent3.xyz/skills/governance-guard/agent)
- [JSON manifest](https://openagent3.xyz/skills/governance-guard/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/governance-guard/agent.md)
- [Download page](https://openagent3.xyz/downloads/governance-guard)