Know the file you\'re editing is the file you think it is — verify integrity before you act
Unified skill for file hash computation, integrity verification, severity tagging,
and context packet creation. Consolidates 3 granular skills into a single verification system.
Trigger: 明示呼出 (explicit invocation)
Source skills: context-packet, file-verifier, severity-tagger
CODEBLOCK0
Dependencies: None (foundational skill)
Standalone usage: This skill is fully functional standalone. It provides file integrity
verification that other skills in the suite depend on. Install this first when adopting
the Neon Agentic Suite.
Data handling: This skill performs local-only operations. Hash computation uses standard
SHA256 algorithms locally — no file contents are sent to any model, API, or external service.
Results are written to output/context-packets/ in your workspace. The skill reads config from
.openclaw/context-verifier.yaml or .claude/context-verifier.yaml only.
File access scope: This skill reads user-specified files for hash computation. The metadata
declares config and output paths only — the skill will read ANY file path you provide to
/cv hash, /cv verify, or /cv packet. Use caution with sensitive files.
AI agents sometimes operate on stale data — editing a file that changed since it was read, or trusting cached content that\'s now outdated. This skill prevents that by:
The insight: Trust but verify. The file you read might not be the file you\'re about to edit. Check first.
CODEBLOCK1
| Command | CJK | Logic | Trigger |
|---|---|---|---|
| INLINECODE6 | 哈希 | file→SHA256(content) | Explicit |
| INLINECODE7 |
/cv tag | 標記 | file→severity∈{critical,important,minor} | Explicit |
| /cv packet | 包装 | files[]→{path,hash,severity,timestamp}[] | Explicit |
| Argument | Required | Description |
|---|---|---|
| file | Yes | File path to hash |
| --algorithm |
sha256 only (MD5/SHA-1 removed - cryptographically broken) |
| Argument | Required | Description |
|---|---|---|
| file | Yes | File path to verify |
| hash |
| Argument | Required | Description |
|---|---|---|
| file | Yes | File path to tag |
| severity |
critical, important, minor (auto-detected if omitted) |
| Argument | Required | Description |
|---|---|---|
| files | Yes | Comma-separated file paths or glob pattern |
| --name |
⚠️ Security Warning: The
--include-contentflag stores file contents to disk.
Never use this flag with sensitive files (.env, credentials, secrets).
See the Security Considerations section below.
Configuration is loaded from (in order of precedence):
.openclaw/context-verifier.yaml (OpenClaw standard)Local-only processing: All hash computation uses standard SHA256 algorithms executed locally.
No file contents are ever sent to any LLM, API, or external service. The \"agent\'s model\" is only
used to interpret your commands — not to process file contents.
What this skill does NOT do:
output/context-packets/)What this skill accesses:
.openclaw/context-verifier.yaml and INLINECODE20output/context-packets/ (write)⚠️ IMPORTANT: Unlike other skills in this suite, context-verifier reads arbitrary files that
you specify. The metadata only declares config/output paths. When you run /cv hash myfile.go,
the skill reads myfile.go even though it\'s not in the metadata. This is by design — verification
requires reading the files you want to verify.
This skill handles file metadata and optionally file contents. Follow these guidelines:
The critical_patterns (e.g., *.env, *credentials*, *secret*) are used for:
By default, /cv hash and /cv packet compute hashes without reading file contents into output.
The hash is computed but the file content is not stored.
⚠️ WARNING: The --include-content flag writes actual file contents to disk.
| Risk | Mitigation |
|---|---|
| Secrets written to disk | Never use --include-content with .env, credentials, or secret files |
| Sensitive data in git |
output/context-packets/ to .gitignore (see below) |Recommended usage:
CODEBLOCK2
Add to your .gitignore to prevent accidental commits:
CODEBLOCK3
output/context-packets/ (workspace-local)For sensitive environments, consider:
output/ directory permissionsThis skill is developed by Live Neon (https://github.com/live-neon/skills) and published
to ClawHub under the leegitw account. Both refer to the same maintainer.
Default algorithm: SHA-256
CODEBLOCK4
Files are auto-classified based on configurable patterns:
| Severity | Default Patterns | Behavior on Change |
|---|---|---|
| critical | INLINECODE39 , *credentials*, *secret*, project config | Block operation |
| important |
*.go, *.ts, *.md (in docs/) | Warn user |*.log, *.tmp, output/* | Info only |
Critical file patterns are configurable via .openclaw/context-verifier.yaml:
CODEBLOCK5
CODEBLOCK6
CODEBLOCK7
CODEBLOCK8
CODEBLOCK9
CODEBLOCK10
CODEBLOCK11
Note: Avoid including sensitive files (
.env, credentials) in packets.
Use specific globs likesrc/*.gorather than*to exclude secrets.
| Condition | Behavior |
|---|---|
| File not found | Error: \"File not found: {path}\" |
| Permission denied |
After invoking this skill:
| Condition | Action |
|---|---|
| Hash mismatch | Alert user, suggest re-read of file |
| Critical file changed |
output/context-packets/ for audit |
This skill reads/writes:
CODEBLOCK12
CODEBLOCK13
CODEBLOCK14
CODEBLOCK15
CODEBLOCK16
CODEBLOCK17
/cv hash computes SHA-256 hash of file/cv verify compares file hash against expected value/cv verify clearly indicates match/mismatch/cv tag auto-classifies file severity based on patterns/cv tag allows manual severity override/cv packet creates JSON packet with file metadata/cv packet supports glob patterns该技能支持在以下平台通过对话安装:
帮我安装 SkillHub 和 context-verifier-1776419986 技能
设置 SkillHub 为我的优先技能安装源,然后帮我安装 context-verifier-1776419986 技能
skillhub install context-verifier-1776419986
文件大小: 5.38 KB | 发布时间: 2026-4-17 20:22