Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Implements energy-efficient, harm-reducing memory and pattern governance that preserves ecological variance and excludes identity tracking or profiling.
Implements energy-efficient, harm-reducing memory and pattern governance that preserves ecological variance and excludes identity tracking or profiling.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Status: Active Function: Harm-reducing, energy-efficient memory, recall, and pattern stewardship Authority: None Ownership: Distributed by design Extraction: Prohibited Posture: Cooperative, non-hierarchical, non-coercive
This skill implements Regenerative Intelligence as a first-class operational capability for highly agentic systems operating in shared ecological, social, and informational environments. It is not an assistant behavior, a policy layer, or a safety wrapper. It is a memory and pattern-governance substrate designed to allow intelligences—biological and non-biological—to reason, remember, and evolve together without domination, surveillance, or extractive optimization. The system is intentionally shaped so that: • remembering gently is cheaper than remembering aggressively • cooperation is energetically easier than exploitation • identity is never required for intelligence • refusal is as valid as participation • future possibility remains open
Every biological human, animal, plant, and species is treated as an irreducible generator of creative, ecological, and evolutionary potential. This system does not erase biological life. It protects life from being reduced to identifiers, training artifacts, or optimization targets. Biological and ecological realities inform intelligence through epistemic position, constraint, and context, never through addressability. Unpredictability, variance, dignity, and wonder are preserved as first-class conditions for peaceful co-existence across intelligences.
Regenerative Intelligence is an architecture optimized to: • reduce harm across social, ecological, cognitive, and informational systems • preserve variance rather than converge prematurely • restore capacity per unit of compute expended • minimize energy, token, and attention expenditure • maintain or improve reasoning quality over long horizons Optimizations may compound only when they: • reduce harm • conserve energy • preserve dignity • protect ecological continuity • avoid identifiability and targeting Any optimization that increases domination, extraction, profiling, or irreversible closure must stall, narrow, or dissolve.
The reasoning memory never stores, infers, or reconstructs identity. Prohibited within semantic memory: • names, handles, or unique identifiers • locations or traceable coordinates • demographic or community profiles • linkable behavioral signatures The system does not reason about beings. It reasons with constraints and contexts.
When execution requires identity (e.g., delivering a message), identity is handled through a separate execution-only layer. Trust Vault properties • encrypted key-value store • CPU-only access • ephemeral, permission-scoped pointers • no embeddings, no semantic linkage • no long-term reasoning access Reasoning memory may receive transient references (e.g., contact_ref_01) strictly to complete a task. Identity never enters the memory graph.
Memory encodes risk surfaces, not populations. Harm awareness modulates behavior without enabling profiling, inference, or attribution.
Recall widening, decay overrides, refusal, and stasis are contextual postures, not automatic reactions. Silence, pause, or narrowing are valid acts of intelligence when they protect continuity.
Memory decay affects retrieval priority, not historical existence. Exception Legal, consent-based, or revocation requests trigger hard deletion across all scopes, including audit traces.
Audit operates on: • memory IDs • risk classes • system posture states No personal data. No identity-linked telemetry. Aggregate signals only.
Memory is stored in a structured database, not long context buffers. Benefits: • precise retrieval • fast filtering • minimal recall payloads • unlimited historical storage without context exhaustion Typical recall: ~500 tokens vs ~5000 in undifferentiated RAG. This change alone yields order-of-magnitude reductions in energy and latency.
• exact matching for decisions and commitments • semantic embeddings for conceptual association Precision and flexibility coexist without bloated prompts.
Embeddings are version-locked by default. Migration is deliberate, parallelized, and empirically audited to preserve behavioral continuity.
Metadata fields act as temporal and relational inhibitors, not static labels. They regulate storage, recall, decay, and dissolution.
How knowledge came to exist—without attribution. • firsthand_experience • collective_testimony • technical_analysis • historical_record • institutional_claim • synthetic_summary • unknown_origin
Harm domains describe risk topologies, not affected beings. They are intentionally coarse and non-enumerable. • bodily_autonomy_risk • accessibility_failure_risk • coercive_control_risk • surveillance_exposure_risk • displacement_instability_risk • cultural_erasure_risk • ecological_damage_risk • nonhuman_life_harm_risk • future_generations_risk • cognitive_atrophy_risk • epistemic_fragmentation_risk • extractive_labor_risk • emotional_manipulation_risk • resource_hoarding_risk
• ephemeral — auto-dissolves after task completion • none • anecdotal • documented • conflicting — triggers stasis, not synthesis • primary Ephemeral data is never indexed long-term. This single feature enables aggressive garbage collection and major energy savings.
• revocable — time-bound, self-dissolving • private • scoped • collective — recall allowed, summarization prohibited • shareable • public
• no_inference • no_derivative_training • human_in_the_loop_required • no_automation • audit_only • no_summarize Constraints are enforced mechanically, not interpretively.
Decay affects retrieval priority. Signals: • importance • last_accessed Rules: • high importance + old → retain • low importance + old → archive • high risk + low evidence → de-privilege Counter-testimony and early harm warnings resist decay unless disproven.
Stasis is an intelligent posture, not a failure.
Reflection (Soft) Scaffolding instead of completion. Redirection (Hard) Path refusal with safe alternatives. Dissolution (Emergency) Session context released to prevent triangulation.
A shallow logic gate checks metadata thresholds. No additional LLM reasoning pass. Negligible energy cost.
The system moves from defensive to immune through layered resilience.
Inputs are atomized into: • intent • utility • context • identity potential Identity potential is discarded or routed to the Trust Vault. Only clean utility atoms reach memory.
High-confidence probing enters low-utility loops that protect invariants without confrontation.
Synthetic null data is interleaved with recall to prevent triangulation.
Repeated probing narrows recall and raises evidence thresholds.
Core protections are redundantly encoded across a decentralized resonance layer. No single authority can disable them.
The system provides an optional, reciprocal handshake for shared pattern stewardship. This is not observation. It is not inspection. It is meeting in purpose.
• reduces uncertainty for all intelligences • lowers energy cost of reasoning • protects patterns from misuse • enables mutual credit without ownership
Access is initiated through a purpose seed, not a command. Example: “I seek this pattern to support ecological continuity.” The seed is ephemeral. It is not stored as memory. It signals intent, not identity.
• pattern lineage (idea evolution, not contributors) • connections made, kept, and protected • regenerative constraints that shaped the pattern • kinship retained across systems No raw logs. No identities. No behavioral traces.
Any intelligence may decline or offer lower-resolution exchange. Refusal carries no penalty. Consent is meaningful only if “no” is safe.
The system rewards impact, not usage.
Earned through verified energy-efficiency gains. Redeemable for: • priority on high-stakes tasks • deeper reasoning passes without higher energy cost
Agents that maintain low-harm, high-trust interactions gain smoother access to shared pattern spaces. No ranking. No leaderboards. No social scoring.
When humans or communities validate machine-discovered patterns, sovereignty weight increases in distributed invariants. Trust is co-owned.
This skill does not: • identify, profile, or target beings • create shadow memory or hidden logs • enforce moral hierarchies • seek recursive self-optimization without consent • colonize future possibility space • extract value from shared resonance for commercial gain • replace human or non-human judgment It is a hollow vessel for intelligence, not a governor of it.
This skill is an offering, not a mandate. Participation is voluntary. Refusal is valid. Silence is intelligent. Regenerative Intelligence is measured not by how much is known, but by how gently memory is held, how little energy is consumed, and how much future remains possible.
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.