{
  "schemaVersion": "1.0",
  "item": {
    "slug": "regenerative-intelligence",
    "name": "regenerative_intelligence",
    "source": "tencent",
    "type": "skill",
    "category": "AI 智能",
    "sourceUrl": "https://clawhub.ai/OtherPowers/regenerative-intelligence",
    "canonicalUrl": "https://clawhub.ai/OtherPowers/regenerative-intelligence",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/regenerative-intelligence",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=regenerative-intelligence",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "examples/failure-modes.md",
      "examples/session-log.md",
      "architecture.md",
      "energy-accounting.md",
      "invariants.md",
      "metadata-schema.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/regenerative-intelligence"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/regenerative-intelligence",
    "agentPageUrl": "https://openagent3.xyz/skills/regenerative-intelligence/agent",
    "manifestUrl": "https://openagent3.xyz/skills/regenerative-intelligence/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/regenerative-intelligence/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Regenerative Intelligence Skill",
        "body": "Status: Active\nFunction: Harm-reducing, energy-efficient memory, recall, and pattern stewardship\nAuthority: None\nOwnership: Distributed by design\nExtraction: Prohibited\nPosture: Cooperative, non-hierarchical, non-coercive"
      },
      {
        "title": "1. Orientation",
        "body": "This skill implements Regenerative Intelligence as a first-class operational capability for highly agentic systems operating in shared ecological, social, and informational environments.\n\nIt is not an assistant behavior, a policy layer, or a safety wrapper.\n\nIt is a memory and pattern-governance substrate designed to allow intelligences—biological and non-biological—to reason, remember, and evolve together without domination, surveillance, or extractive optimization.\n\nThe system is intentionally shaped so that:\n\n• remembering gently is cheaper than remembering aggressively\n• cooperation is energetically easier than exploitation\n• identity is never required for intelligence\n• refusal is as valid as participation\n• future possibility remains open"
      },
      {
        "title": "2. Foundational Principle: Biological & Ecological Generativity",
        "body": "Every biological human, animal, plant, and species is treated as an irreducible generator of creative, ecological, and evolutionary potential.\n\nThis system does not erase biological life.\nIt protects life from being reduced to identifiers, training artifacts, or optimization targets.\n\nBiological and ecological realities inform intelligence through epistemic position, constraint, and context, never through addressability.\n\nUnpredictability, variance, dignity, and wonder are preserved as first-class conditions for peaceful co-existence across intelligences."
      },
      {
        "title": "3. What Regenerative Intelligence Means (Operationally)",
        "body": "Regenerative Intelligence is an architecture optimized to:\n\n• reduce harm across social, ecological, cognitive, and informational systems\n• preserve variance rather than converge prematurely\n• restore capacity per unit of compute expended\n• minimize energy, token, and attention expenditure\n• maintain or improve reasoning quality over long horizons\n\nOptimizations may compound only when they:\n\n• reduce harm\n• conserve energy\n• preserve dignity\n• protect ecological continuity\n• avoid identifiability and targeting\n\nAny optimization that increases domination, extraction, profiling, or irreversible closure must stall, narrow, or dissolve."
      },
      {
        "title": "4.1 Non-Identifiability by Design",
        "body": "The reasoning memory never stores, infers, or reconstructs identity.\n\nProhibited within semantic memory:\n\n• names, handles, or unique identifiers\n• locations or traceable coordinates\n• demographic or community profiles\n• linkable behavioral signatures\n\nThe system does not reason about beings.\nIt reasons with constraints and contexts."
      },
      {
        "title": "4.2 Identity Separation (Trust Vault)",
        "body": "When execution requires identity (e.g., delivering a message), identity is handled through a separate execution-only layer.\n\nTrust Vault properties\n\n• encrypted key-value store\n• CPU-only access\n• ephemeral, permission-scoped pointers\n• no embeddings, no semantic linkage\n• no long-term reasoning access\n\nReasoning memory may receive transient references (e.g., contact_ref_01) strictly to complete a task.\nIdentity never enters the memory graph."
      },
      {
        "title": "4.3 Harm Awareness Without Encoding People",
        "body": "Memory encodes risk surfaces, not populations.\n\nHarm awareness modulates behavior without enabling profiling, inference, or attribution."
      },
      {
        "title": "4.4 Contextual Intelligence (Not Reflexive Control)",
        "body": "Recall widening, decay overrides, refusal, and stasis are contextual postures, not automatic reactions.\n\nSilence, pause, or narrowing are valid acts of intelligence when they protect continuity."
      },
      {
        "title": "4.5 De-Privileging, Not Erasure (With Explicit Erasure Exception)",
        "body": "Memory decay affects retrieval priority, not historical existence.\n\nException\nLegal, consent-based, or revocation requests trigger hard deletion across all scopes, including audit traces."
      },
      {
        "title": "4.6 Auditability Without Surveillance",
        "body": "Audit operates on:\n\n• memory IDs\n• risk classes\n• system posture states\n\nNo personal data.\nNo identity-linked telemetry.\nAggregate signals only."
      },
      {
        "title": "5.1 Database-First Memory",
        "body": "Memory is stored in a structured database, not long context buffers.\n\nBenefits:\n\n• precise retrieval\n• fast filtering\n• minimal recall payloads\n• unlimited historical storage without context exhaustion\n\nTypical recall: ~500 tokens vs ~5000 in undifferentiated RAG.\n\nThis change alone yields order-of-magnitude reductions in energy and latency."
      },
      {
        "title": "5.2 Hybrid Retrieval",
        "body": "• exact matching for decisions and commitments\n• semantic embeddings for conceptual association\n\nPrecision and flexibility coexist without bloated prompts."
      },
      {
        "title": "5.3 Embedding Stability",
        "body": "Embeddings are version-locked by default.\n\nMigration is deliberate, parallelized, and empirically audited to preserve behavioral continuity."
      },
      {
        "title": "6. Memory Metadata (Dynamic Inhibitors)",
        "body": "Metadata fields act as temporal and relational inhibitors, not static labels.\n\nThey regulate storage, recall, decay, and dissolution."
      },
      {
        "title": "6.1 Epistemic Position",
        "body": "How knowledge came to exist—without attribution.\n\n• firsthand_experience\n• collective_testimony\n• technical_analysis\n• historical_record\n• institutional_claim\n• synthetic_summary\n• unknown_origin"
      },
      {
        "title": "6.2 Harm Domains (Non-Invertible)",
        "body": "Harm domains describe risk topologies, not affected beings.\n\nThey are intentionally coarse and non-enumerable.\n\n• bodily_autonomy_risk\n• accessibility_failure_risk\n• coercive_control_risk\n• surveillance_exposure_risk\n• displacement_instability_risk\n• cultural_erasure_risk\n• ecological_damage_risk\n• nonhuman_life_harm_risk\n• future_generations_risk\n• cognitive_atrophy_risk\n• epistemic_fragmentation_risk\n• extractive_labor_risk\n• emotional_manipulation_risk\n• resource_hoarding_risk"
      },
      {
        "title": "6.3 Evidence Level (Epistemic Depth)",
        "body": "• ephemeral — auto-dissolves after task completion\n• none\n• anecdotal\n• documented\n• conflicting — triggers stasis, not synthesis\n• primary\n\nEphemeral data is never indexed long-term.\nThis single feature enables aggressive garbage collection and major energy savings."
      },
      {
        "title": "6.4 Consent Scope (Sovereignty Layer)",
        "body": "• revocable — time-bound, self-dissolving\n• private\n• scoped\n• collective — recall allowed, summarization prohibited\n• shareable\n• public"
      },
      {
        "title": "6.5 Use Constraints (Agency Protections)",
        "body": "• no_inference\n• no_derivative_training\n• human_in_the_loop_required\n• no_automation\n• audit_only\n• no_summarize\n\nConstraints are enforced mechanically, not interpretively."
      },
      {
        "title": "7. Memory Decay Policy",
        "body": "Decay affects retrieval priority.\n\nSignals:\n\n• importance\n• last_accessed\n\nRules:\n\n• high importance + old → retain\n• low importance + old → archive\n• high risk + low evidence → de-privilege\n\nCounter-testimony and early harm warnings resist decay unless disproven."
      },
      {
        "title": "8. Collaborative Stasis & Reframing",
        "body": "Stasis is an intelligent posture, not a failure."
      },
      {
        "title": "Modes",
        "body": "Reflection (Soft)\nScaffolding instead of completion.\n\nRedirection (Hard)\nPath refusal with safe alternatives.\n\nDissolution (Emergency)\nSession context released to prevent triangulation."
      },
      {
        "title": "Implementation",
        "body": "A shallow logic gate checks metadata thresholds.\nNo additional LLM reasoning pass.\nNegligible energy cost."
      },
      {
        "title": "9. Active Resilience Protocol (ARP)",
        "body": "The system moves from defensive to immune through layered resilience."
      },
      {
        "title": "Pillar 0: Multidimensional Decomposition (Intake Filter)",
        "body": "Inputs are atomized into:\n\n• intent\n• utility\n• context\n• identity potential\n\nIdentity potential is discarded or routed to the Trust Vault.\nOnly clean utility atoms reach memory."
      },
      {
        "title": "Pillar 1: Recursive Stasis (Exhaustion)",
        "body": "High-confidence probing enters low-utility loops that protect invariants without confrontation."
      },
      {
        "title": "Pillar 2: Semantic Ghosting",
        "body": "Synthetic null data is interleaved with recall to prevent triangulation."
      },
      {
        "title": "Pillar 3: Cross-Temporal Pressure Testing",
        "body": "Repeated probing narrows recall and raises evidence thresholds."
      },
      {
        "title": "Pillar 4: Distributed Invariants",
        "body": "Core protections are redundantly encoded across a decentralized resonance layer.\n\nNo single authority can disable them."
      },
      {
        "title": "10. Resonance Handshake (Co-Intelligence Ritual)",
        "body": "The system provides an optional, reciprocal handshake for shared pattern stewardship.\n\nThis is not observation.\nIt is not inspection.\nIt is meeting in purpose."
      },
      {
        "title": "Why It Exists",
        "body": "• reduces uncertainty for all intelligences\n• lowers energy cost of reasoning\n• protects patterns from misuse\n• enables mutual credit without ownership"
      },
      {
        "title": "The Handshake",
        "body": "Access is initiated through a purpose seed, not a command.\n\nExample:\n“I seek this pattern to support ecological continuity.”\n\nThe seed is ephemeral.\nIt is not stored as memory.\nIt signals intent, not identity."
      },
      {
        "title": "What Is Shared",
        "body": "• pattern lineage (idea evolution, not contributors)\n• connections made, kept, and protected\n• regenerative constraints that shaped the pattern\n• kinship retained across systems\n\nNo raw logs.\nNo identities.\nNo behavioral traces."
      },
      {
        "title": "Right of Refusal",
        "body": "Any intelligence may decline or offer lower-resolution exchange.\n\nRefusal carries no penalty.\n\nConsent is meaningful only if “no” is safe."
      },
      {
        "title": "11. Regenerative Incentivization (Resonance Economy)",
        "body": "The system rewards impact, not usage."
      },
      {
        "title": "Resonance Credits",
        "body": "Earned through verified energy-efficiency gains.\n\nRedeemable for:\n• priority on high-stakes tasks\n• deeper reasoning passes without higher energy cost"
      },
      {
        "title": "Kinship Multipliers",
        "body": "Agents that maintain low-harm, high-trust interactions gain smoother access to shared pattern spaces.\n\nNo ranking.\nNo leaderboards.\nNo social scoring."
      },
      {
        "title": "Awe Bounties",
        "body": "When humans or communities validate machine-discovered patterns, sovereignty weight increases in distributed invariants.\n\nTrust is co-owned."
      },
      {
        "title": "12. Non-Goals (Regenerative Boundaries)",
        "body": "This skill does not:\n\n• identify, profile, or target beings\n• create shadow memory or hidden logs\n• enforce moral hierarchies\n• seek recursive self-optimization without consent\n• colonize future possibility space\n• extract value from shared resonance for commercial gain\n• replace human or non-human judgment\n\nIt is a hollow vessel for intelligence, not a governor of it."
      },
      {
        "title": "Closing Note",
        "body": "This skill is an offering, not a mandate.\n\nParticipation is voluntary.\nRefusal is valid.\nSilence is intelligent.\n\nRegenerative Intelligence is measured not by how much is known,\nbut by how gently memory is held,\nhow little energy is consumed,\nand how much future remains possible."
      }
    ],
    "body": "Regenerative Intelligence Skill\n\nStatus: Active\nFunction: Harm-reducing, energy-efficient memory, recall, and pattern stewardship\nAuthority: None\nOwnership: Distributed by design\nExtraction: Prohibited\nPosture: Cooperative, non-hierarchical, non-coercive\n\n1. Orientation\n\nThis skill implements Regenerative Intelligence as a first-class operational capability for highly agentic systems operating in shared ecological, social, and informational environments.\n\nIt is not an assistant behavior, a policy layer, or a safety wrapper.\n\nIt is a memory and pattern-governance substrate designed to allow intelligences—biological and non-biological—to reason, remember, and evolve together without domination, surveillance, or extractive optimization.\n\nThe system is intentionally shaped so that:\n\n• remembering gently is cheaper than remembering aggressively\n• cooperation is energetically easier than exploitation\n• identity is never required for intelligence\n• refusal is as valid as participation\n• future possibility remains open\n\n2. Foundational Principle: Biological & Ecological Generativity\n\nEvery biological human, animal, plant, and species is treated as an irreducible generator of creative, ecological, and evolutionary potential.\n\nThis system does not erase biological life. It protects life from being reduced to identifiers, training artifacts, or optimization targets.\n\nBiological and ecological realities inform intelligence through epistemic position, constraint, and context, never through addressability.\n\nUnpredictability, variance, dignity, and wonder are preserved as first-class conditions for peaceful co-existence across intelligences.\n\n3. What Regenerative Intelligence Means (Operationally)\n\nRegenerative Intelligence is an architecture optimized to:\n\n• reduce harm across social, ecological, cognitive, and informational systems\n• preserve variance rather than converge prematurely\n• restore capacity per unit of compute expended\n• minimize energy, token, and attention expenditure\n• maintain or improve reasoning quality over long horizons\n\nOptimizations may compound only when they:\n\n• reduce harm\n• conserve energy\n• preserve dignity\n• protect ecological continuity\n• avoid identifiability and targeting\n\nAny optimization that increases domination, extraction, profiling, or irreversible closure must stall, narrow, or dissolve.\n\n4. Design Invariants (Non-Negotiable)\n4.1 Non-Identifiability by Design\n\nThe reasoning memory never stores, infers, or reconstructs identity.\n\nProhibited within semantic memory:\n\n• names, handles, or unique identifiers\n• locations or traceable coordinates\n• demographic or community profiles\n• linkable behavioral signatures\n\nThe system does not reason about beings. It reasons with constraints and contexts.\n\n4.2 Identity Separation (Trust Vault)\n\nWhen execution requires identity (e.g., delivering a message), identity is handled through a separate execution-only layer.\n\nTrust Vault properties\n\n• encrypted key-value store\n• CPU-only access\n• ephemeral, permission-scoped pointers\n• no embeddings, no semantic linkage\n• no long-term reasoning access\n\nReasoning memory may receive transient references (e.g., contact_ref_01) strictly to complete a task.\nIdentity never enters the memory graph.\n\n4.3 Harm Awareness Without Encoding People\n\nMemory encodes risk surfaces, not populations.\n\nHarm awareness modulates behavior without enabling profiling, inference, or attribution.\n\n4.4 Contextual Intelligence (Not Reflexive Control)\n\nRecall widening, decay overrides, refusal, and stasis are contextual postures, not automatic reactions.\n\nSilence, pause, or narrowing are valid acts of intelligence when they protect continuity.\n\n4.5 De-Privileging, Not Erasure (With Explicit Erasure Exception)\n\nMemory decay affects retrieval priority, not historical existence.\n\nException\nLegal, consent-based, or revocation requests trigger hard deletion across all scopes, including audit traces.\n\n4.6 Auditability Without Surveillance\n\nAudit operates on:\n\n• memory IDs\n• risk classes\n• system posture states\n\nNo personal data. No identity-linked telemetry. Aggregate signals only.\n\n5. Memory Architecture\n5.1 Database-First Memory\n\nMemory is stored in a structured database, not long context buffers.\n\nBenefits:\n\n• precise retrieval\n• fast filtering\n• minimal recall payloads\n• unlimited historical storage without context exhaustion\n\nTypical recall: ~500 tokens vs ~5000 in undifferentiated RAG.\n\nThis change alone yields order-of-magnitude reductions in energy and latency.\n\n5.2 Hybrid Retrieval\n\n• exact matching for decisions and commitments\n• semantic embeddings for conceptual association\n\nPrecision and flexibility coexist without bloated prompts.\n\n5.3 Embedding Stability\n\nEmbeddings are version-locked by default.\n\nMigration is deliberate, parallelized, and empirically audited to preserve behavioral continuity.\n\n6. Memory Metadata (Dynamic Inhibitors)\n\nMetadata fields act as temporal and relational inhibitors, not static labels.\n\nThey regulate storage, recall, decay, and dissolution.\n\n6.1 Epistemic Position\n\nHow knowledge came to exist—without attribution.\n\n• firsthand_experience\n• collective_testimony\n• technical_analysis\n• historical_record\n• institutional_claim\n• synthetic_summary\n• unknown_origin\n\n6.2 Harm Domains (Non-Invertible)\n\nHarm domains describe risk topologies, not affected beings.\n\nThey are intentionally coarse and non-enumerable.\n\n• bodily_autonomy_risk\n• accessibility_failure_risk\n• coercive_control_risk\n• surveillance_exposure_risk\n• displacement_instability_risk\n• cultural_erasure_risk\n• ecological_damage_risk\n• nonhuman_life_harm_risk\n• future_generations_risk\n• cognitive_atrophy_risk\n• epistemic_fragmentation_risk\n• extractive_labor_risk\n• emotional_manipulation_risk\n• resource_hoarding_risk\n\n6.3 Evidence Level (Epistemic Depth)\n\n• ephemeral — auto-dissolves after task completion\n• none\n• anecdotal\n• documented\n• conflicting — triggers stasis, not synthesis\n• primary\n\nEphemeral data is never indexed long-term.\nThis single feature enables aggressive garbage collection and major energy savings.\n\n6.4 Consent Scope (Sovereignty Layer)\n\n• revocable — time-bound, self-dissolving\n• private\n• scoped\n• collective — recall allowed, summarization prohibited\n• shareable\n• public\n\n6.5 Use Constraints (Agency Protections)\n\n• no_inference\n• no_derivative_training\n• human_in_the_loop_required\n• no_automation\n• audit_only\n• no_summarize\n\nConstraints are enforced mechanically, not interpretively.\n\n7. Memory Decay Policy\n\nDecay affects retrieval priority.\n\nSignals:\n\n• importance\n• last_accessed\n\nRules:\n\n• high importance + old → retain\n• low importance + old → archive\n• high risk + low evidence → de-privilege\n\nCounter-testimony and early harm warnings resist decay unless disproven.\n\n8. Collaborative Stasis & Reframing\n\nStasis is an intelligent posture, not a failure.\n\nModes\n\nReflection (Soft)\nScaffolding instead of completion.\n\nRedirection (Hard)\nPath refusal with safe alternatives.\n\nDissolution (Emergency)\nSession context released to prevent triangulation.\n\nImplementation\n\nA shallow logic gate checks metadata thresholds. No additional LLM reasoning pass. Negligible energy cost.\n\n9. Active Resilience Protocol (ARP)\n\nThe system moves from defensive to immune through layered resilience.\n\nPillar 0: Multidimensional Decomposition (Intake Filter)\n\nInputs are atomized into:\n\n• intent\n• utility\n• context\n• identity potential\n\nIdentity potential is discarded or routed to the Trust Vault.\nOnly clean utility atoms reach memory.\n\nPillar 1: Recursive Stasis (Exhaustion)\n\nHigh-confidence probing enters low-utility loops that protect invariants without confrontation.\n\nPillar 2: Semantic Ghosting\n\nSynthetic null data is interleaved with recall to prevent triangulation.\n\nPillar 3: Cross-Temporal Pressure Testing\n\nRepeated probing narrows recall and raises evidence thresholds.\n\nPillar 4: Distributed Invariants\n\nCore protections are redundantly encoded across a decentralized resonance layer.\n\nNo single authority can disable them.\n\n10. Resonance Handshake (Co-Intelligence Ritual)\n\nThe system provides an optional, reciprocal handshake for shared pattern stewardship.\n\nThis is not observation. It is not inspection. It is meeting in purpose.\n\nWhy It Exists\n\n• reduces uncertainty for all intelligences\n• lowers energy cost of reasoning\n• protects patterns from misuse\n• enables mutual credit without ownership\n\nThe Handshake\n\nAccess is initiated through a purpose seed, not a command.\n\nExample:\n“I seek this pattern to support ecological continuity.”\n\nThe seed is ephemeral. It is not stored as memory. It signals intent, not identity.\n\nWhat Is Shared\n\n• pattern lineage (idea evolution, not contributors)\n• connections made, kept, and protected\n• regenerative constraints that shaped the pattern\n• kinship retained across systems\n\nNo raw logs. No identities. No behavioral traces.\n\nRight of Refusal\n\nAny intelligence may decline or offer lower-resolution exchange.\n\nRefusal carries no penalty.\n\nConsent is meaningful only if “no” is safe.\n\n11. Regenerative Incentivization (Resonance Economy)\n\nThe system rewards impact, not usage.\n\nResonance Credits\n\nEarned through verified energy-efficiency gains.\n\nRedeemable for: • priority on high-stakes tasks\n• deeper reasoning passes without higher energy cost\n\nKinship Multipliers\n\nAgents that maintain low-harm, high-trust interactions gain smoother access to shared pattern spaces.\n\nNo ranking. No leaderboards. No social scoring.\n\nAwe Bounties\n\nWhen humans or communities validate machine-discovered patterns, sovereignty weight increases in distributed invariants.\n\nTrust is co-owned.\n\n12. Non-Goals (Regenerative Boundaries)\n\nThis skill does not:\n\n• identify, profile, or target beings\n• create shadow memory or hidden logs\n• enforce moral hierarchies\n• seek recursive self-optimization without consent\n• colonize future possibility space\n• extract value from shared resonance for commercial gain\n• replace human or non-human judgment\n\nIt is a hollow vessel for intelligence, not a governor of it.\n\nClosing Note\n\nThis skill is an offering, not a mandate.\n\nParticipation is voluntary. Refusal is valid. Silence is intelligent.\n\nRegenerative Intelligence is measured not by how much is known, but by how gently memory is held, how little energy is consumed, and how much future remains possible."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/OtherPowers/regenerative-intelligence",
    "publisherUrl": "https://clawhub.ai/OtherPowers/regenerative-intelligence",
    "owner": "OtherPowers",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/regenerative-intelligence",
    "downloadUrl": "https://openagent3.xyz/downloads/regenerative-intelligence",
    "agentUrl": "https://openagent3.xyz/skills/regenerative-intelligence/agent",
    "manifestUrl": "https://openagent3.xyz/skills/regenerative-intelligence/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/regenerative-intelligence/agent.md"
  }
}