Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Guarantee instruction compliance with root cause analysis, flow verification, and automated validators that make future failures impossible.
Guarantee instruction compliance with root cause analysis, flow verification, and automated validators that make future failures impossible.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
User is frustrated that the agent ignored instructions. Something critical happened that cannot repeat. User explicitly says "this can never happen again" or "I told you not to..." User explicitly invokes /discipline to ensure compliance on a rule.
ββββββββββββββββββββββββββββββββββββββββββββββββ β DISCIPLINE TRIGGER β ββββββββββββββββββββββββββββββββββββββββββββββββ β ββββββββββββββββββββββΌβββββββββββββββββββββ βΌ βΌ βΌ βββββββββββ ββββββββββββ βββββββββββ β USER β β CRITICAL β β COMMAND β β UPSET β β FAILURE β β USED β ββββββ¬βββββ ββββββ¬ββββββ ββββββ¬βββββ β β β β "I told you..." β Security breach, β /discipline β "Why did you..." β data loss... β β β β βββββββββββββββββββββ΄βββββββββββββββββββββ β βΌ βββββββββββββββββββ β SEVERITY β β π΄ π‘ π’ β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β ROOT CAUSE β β 5 Whys: Why β β wasn't it β β followed? β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β FLOW VERIFY β β Will next agent β β see the fix? β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β VALIDATOR β β Script that β β blocks action β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β COMPLETE β β Logged+Enforced β βββββββββββββββββββ
On first use, read setup.md for integration guidelines. Creates ~/self-discipline/ for rules, validators, and enforcement logs.
Memory lives in ~/self-discipline/. See memory-template.md for structure. ~/self-discipline/ βββ memory.md # Status + severity thresholds + stats βββ rules.md # Active discipline rules (ALWAYS loaded) βββ incidents.md # Incident log with root cause analysis βββ validators/ # Executable validators β βββ pre-commit/ # Run before git commits β βββ pre-send/ # Run before sending messages β βββ custom/ # Domain-specific validators βββ flow-analysis/ # Instruction flow traces βββ archive/ # Resolved incidents
TopicFileSetup processsetup.mdMemory templatememory-template.mdSeverity assessmentseverity.mdRoot cause protocolroot-cause.mdFlow verificationflow-verification.mdValidator patternsvalidators.md
When triggered, assess severity FIRST: LevelIndicatorsResponseπ΄ CRITICALUser angry, security risk, data loss, broken prod, financial impactFull analysis + MANDATORY validatorπ‘ MEDIUMUser frustrated, wasted time, incorrect outputFull analysis + instruction fixπ’ LOWUser annoyed, preference violatedLog + monitor Default to one level higher if uncertain.
Never jump to "I'll remember that." Instead: What exactly failed? β Be specific What was the instruction? β Quote it verbatim Where was the instruction? β Path + line number Why wasn't it followed? β 5 Whys: Why? β Not loaded in context Why? β File not in session's read path Why? β No reference in AGENTS.md / system prompt Why? β Setup assumed it would be read Why? β No verification mechanism
After identifying where the instruction SHOULD be, trace the actual agent flow: START: New session begins β READ: System prompt loaded β READ: AGENTS.md (if exists) β READ: MEMORY.md (if referenced) β READ: Other files (if referenced) β QUESTION: Is the instruction in ANY of these? If instruction is NOT in the flow: The fix is NOT to "write it somewhere" The fix IS to add it to a file ALREADY in the flow OR add a reference to its location in a file ALREADY in the flow
NEVER modify files outside ~/self-discipline/ without explicit user permission. When suggesting changes to AGENTS.md, HEARTBEAT.md, or other files: ActionRequirementCreate ~/self-discipline/Ask permission firstEdit AGENTS.mdShow exact changes, wait for approvalAdd to HEARTBEAT.mdShow exact changes, wait for approvalCreate validator scriptShow script content, wait for approvalEdit any existing fileBackup first + user confirmation Flow for external file changes: Explain WHY the change is needed Show EXACTLY what will be added/changed Wait for explicit "yes" / approval Only then make the change
For π΄ CRITICAL issues, create automated validators: # Example: ~/self-discipline/validators/pre-send/no-secrets.sh #!/usr/bin/env bash set -euo pipefail # SECURITY MANIFEST: # Environment variables accessed: none # External endpoints called: none # Local files read: message content (stdin) # Local files written: none # Check for secrets before sending messages if echo "$1" | grep -qE '(password|token|key)='; then echo "β BLOCKED: Message contains potential secret" echo "Rule: no-secrets-in-messages (from incident 2024-02-15)" exit 1 fi Validators must: Exit 0 = pass, exit 1 = block Include the rule origin (incident reference) Never modify data, only check
In ~/self-discipline/memory.md, maintain: MetricPurposeActive rulesRules currently being enforcedIncidents by severityPattern detectionValidator triggersHow often rules catch violationsStreakDays since last repeat violation
If the same rule is violated twice: First violation: Full analysis + fix Second violation: Promote to CRITICAL + mandatory validator Third violation: STOP and ask user for intervention
See severity.md for detailed criteria.
QuestionIf YES βIs the user visibly upset?+1 severityCould this cause data loss?Automatic CRITICALCould this cause security breach?Automatic CRITICALCould this affect production?Automatic CRITICALHas this happened before?+1 severityDid user use "never" or "always"?+1 severity
See flow-verification.md for complete protocol.
CauseFrequencySolutionWritten in file not in load path60%Move or add referenceBuried in long file, not seen20%Move to top or separate fileContradicted by other instruction10%Resolve conflict explicitlyContext window overflow5%Shorten, prioritizeModel genuinely forgot5%Add validator
Identify all files in agent's load path (system prompt, AGENTS.md, etc.) Check if instruction location is in that path If not in path: Find where to add reference If in path but buried: Move to more prominent location If contradicted: Resolve with explicit priority
See validators.md for complete reference.
TypeWhen RunExamplespre-commitBefore git commitNo secrets, no WIPpre-sendBefore message sendNo secrets, format checkspre-actionBefore specific actionConfirm before deleteperiodicOn heartbeatState verification
#!/usr/bin/env bash set -euo pipefail # SECURITY MANIFEST: # Environment variables accessed: [list] # External endpoints called: [list or "none"] # Local files read: [list] # Local files written: [list or "none"] # Validator: [rule-name] # Created: YYYY-MM-DD # Incident: [reference] # Severity: CRITICAL # [description of what this validates] [validation logic] if [condition that should fail]; then echo "β BLOCKED: [reason]" echo "Rule: [rule-name] (from incident [date])" exit 1 fi exit 0
TrapConsequenceSolutionWriting rule in memory.md onlyFuture agent won't see itAdd to rules.md (always loaded)"I'll remember" without verificationSame mistake in 3 sessionsAlways verify flow reachabilityValidator that modifies dataUnexpected side effectsValidators ONLY check, never modifyNot backing up before editsCan't recover if wrongALWAYS backup before modifyingSkipping severity assessmentUnder-responding to critical issuesAssess severity FIRST, alwaysPutting rules in wrong fileRules not loadedOnly rules.md is guaranteed loaded
CommandAction/disciplineStart discipline process for last issue/discipline statusShow active rules and stats/discipline verify [rule]Run flow verification for rule/discipline test [validator]Dry-run a validator/discipline historyShow incident log
Data that stays local: All rules, incidents, and validators in ~/self-discipline/ No data sent to external services No telemetry or analytics This skill does NOT: Make network requests Access credentials or secrets Modify files without explicit user permission Run validators without user approval Access files outside ~/self-discipline/ without asking File modifications outside ~/self-discipline/: Only suggested when needed for rule visibility (e.g., AGENTS.md reference) Always shown to user first Require explicit approval before execution Include backup before any edit
Install with clawhub install <slug> if user confirms: reflection β structured self-evaluation memory β persistent memory patterns decide β decision-making patterns escalate β know when to ask vs act learning β adaptive learning system
If useful: clawhub star self-discipline Stay updated: clawhub sync
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.