Rules for trusted NanoClaw groups. Shared memory, session bootstrap, cross-group memory updates. Loaded for trusted and main containers only.
94
94%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
curl https://api.github.com/... doesn't return command not found (the cli-tools-not-installed rule's territory) — it appears to work, then quietly fails differently. 49 distinct curl-against-api.github.com command shapes on the operator-observer chat 2026-04-28..05-03 (all in telegram_old-wtf) all hit the unauthenticated public-API path and probed more URLs to triangulate after each 404.
{successful: false, error: "..."}.The Composio GITHUB_* tools enumerated in the cli-tools-not-installed rule. If a specific endpoint isn't covered by an existing tool, surface that gap explicitly — don't reach for curl as the workaround. The most common missing-tool scenario gets solved by GITHUB_SEARCH_REPOSITORIES or GITHUB_SEARCH_ISSUES_AND_PULL_REQUESTS, which resolve fork-name lookups in one shot rather than the N-curl-probe pattern that surfaced the audit.
The unauthenticated curl path is not solvable by adding Authorization: Bearer ... to the curl invocation — there's no PAT in the container, by design (per coding-policy: no-secrets). Composio holds the authenticated client; the agent calls Composio.
rules
skills
system-status
trusted-memory