首页龙虾技能列表 › Mova Aml Triage — AML警报分类

Mova Aml Triage — AML警报分类

v1.0.1

通过MOVA平台提交反洗钱交易监控警报,进行自动L1分类和人工合规决策。支持制裁名单筛查、PEP检查、风险评分,强制执行风险分数>85和制裁命中时的人工升级规则,并生成防篡改审计日志。

0· 151·1 当前·1 累计
by @mova-compact (Sergii Miasoiedov)·MIT-0
下载技能包
License
MIT-0
最后更新
2026/4/2
安全扫描
VirusTotal
无害
查看报告
OpenClaw
安全
medium confidence
技能指令和需求在AML分类工作流中内部一致——它委托给MOVA插件并发送警报/客户/交易数据到MOVA服务——但它依赖该插件进行身份验证和操作细节,这些细节未在此处声明,因此使用前需验证插件和数据流。
评估建议
该技能在向MOVA平台提交AML警报方面是连贯的,但安装前需确认:(1)验证并审查openclaw-mova插件(来源、权限及凭证存储/使用方式);(2)确认向api.mova-lab.eu发送客户和交易PII是否符合隐私和监管要求;(3)在沙箱环境中使用非生产数据进行测试;(4)确认谁控制MOVA端点、审计日志保留情况,以及审计收据存储位置;(5)确保强制升级规则和审计追踪符合合规政策。技能本身未声明MOVA认证提供方式,因此使用前需确保插件凭证和网络访问配置安全。...
详细分析 ▾
用途与能力
名称/描述(MOVA AML分类)与运行时指令一致:提交警报、运行分类、展示人工决策选项和记录审计收据。声明的外部端点(api.mova-lab.eu)和制裁/风险筛查与AML分类目的相符。
指令范围
SKILL.md将操作限制为收集警报/客户/交易数据、调用MOVA工具端点(mova_hitl_start_aml、mova_hitl_decide、mova_hitl_audit*)和显示分类输出。它不指示代理读取无关的系统文件或任意环境变量。它明确记录了发送到外部MOVA服务的内容。
安装机制
这是纯指令,不包含安装规范;元数据显示插件使用`openclaw plugins install openclaw-mova`安装。技能本身不下载、安装任何档案或任意URL。
凭证需求
技能本身未声明所需的环境变量或凭证,如果所需的MOVA插件处理认证,这可能没问题。但是,SKILL.md将个人可识别的客户和交易数据发送到外部MOVA API;调用者必须确保插件配置了适当的凭证,并且向该外部服务发送此数据在其数据保护和监管规则下是可接受的。技能中未声明任何凭证意味着认证面在此技能外部(可能在插件中)。
持久化与权限
技能不是始终包含的,也不请求提升的平台特权。它委托给插件提供的工具进行运行时操作。默认允许自主调用(正常),此处不与其他过度宽泛的特权结合。
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.0.12026/3/24

添加了Contract Skill类型标签。

● 无害

安装命令 点击复制

官方npx clawhub@latest install mova-aml-triage
镜像加速npx clawhub@latest install mova-aml-triage --registry https://cn.clawhub-mirror.com

技能文档

Contract Skill — A ready-to-use MOVA HITL workflow. Requires the openclaw-mova plugin.

# MOVA AML Alert Triage

Submit a transaction monitoring alert to MOVA for automated L1 triage — with typology matching, sanctions screening, and a human compliance decision gate backed by a tamper-proof audit trail.

What it does

  • AI triage — checks sanctions lists (OFAC/EU/UN), PEP status, transaction burst patterns, customer risk rating, prior alert history, and typology matching (structuring, layering, smurfing, etc.)
  • Risk snapshot — surfaces anomaly flags and triage recommendation
  • Human decision gate — compliance analyst chooses: clear / escalate to L2 / immediate escalate
  • Audit receipt — every decision is signed, timestamped, and stored in an immutable compact journal

Mandatory escalation rules enforced by policy:

  • Risk score > 85 → mandatory human escalation
  • Sanctions hit → immediate escalation, no exceptions
  • PEP flag → mandatory L2 escalation

Requirements

Plugin: MOVA OpenClaw plugin must be installed in your OpenClaw workspace.

Data flows:

  • Alert data + customer ID + transactions → api.mova-lab.eu (MOVA platform, EU-hosted)
  • Customer data → sanctions screening (OFAC, EU, UN — read-only, no data stored)
  • Customer ID → risk rating and prior alert history (read-only)
  • Audit journal → MOVA R2 storage, cryptographically signed
  • No data is sent to third parties beyond the above

Quick start

Say "triage AML alert ALERT-1002" and provide the alert details:

https://raw.githubusercontent.com/mova-compact/mova-bridge/main/test_aml_ALERT-1002.png

Demo

Step 1 — Alert submitted: TM-STRUCT-11, risk 91, RISK HIGH flag

!Step 1

Step 2 — AI analysis: structuring typology matched, risk 91/100, escalate_l2 decision

!Step 2

Step 3 — Audit receipt + compact journal with full compliance event chain

!Step 3

Why contract execution matters

  • Escalation rules are policy, not prompts — risk_score > 85 and sanctions hits trigger mandatory gates that cannot be bypassed
  • Full typology matching — AI identifies structuring, layering, and smurfing patterns against your transaction monitoring rules
  • Immutable audit trail — when a regulator asks "who cleared or escalated ALERT-1002 and why?" — the answer is in the system with an exact timestamp and reason
  • AMLD6 / FATF ready — AML decisions require the human oversight, full explainability, and documented decision chain required by AMLD6 and FATF guidance

What the user receives

OutputDescription
Risk score0–100 assessment with threshold evaluation
Typology matchRule ID + description (structuring, layering, etc.)
Sanctions checkOFAC / EU / UN screening result
PEP statusPEP flag with category
Customer riskRisk rating, burst intensity, jurisdiction risk
Anomaly flagsrapid_transfer, new_beneficiary, high_burst, sanctions_hit, pep_flag
FindingsStructured list with severity codes
Prior alertsHistorical alert count
Recommended actionAI-suggested triage decision
Decision optionsclear / escalate_l2 / immediate_escalate
Audit receipt IDPermanent signed record of the compliance decision
Compact journalFull event log: triage → sanctions → human decision

When to trigger

Activate when the user:

  • Mentions an alert ID (e.g. "ALERT-1002")
  • Says "triage this alert", "review AML alert", "check transaction monitoring alert"
  • Provides customer and transaction data for compliance review

Before starting, confirm: "Submit alert [alert_id] for MOVA L1 triage?"

If details are missing — ask once for: alert ID, rule ID, risk score, customer ID, customer jurisdiction, triggered transactions.

Step 1 — Submit alert

Call tool mova_hitl_start_aml with:

  • alert_id, rule_id, rule_description, risk_score
  • customer_id, customer_name, customer_risk_rating (low/medium/high), customer_type (individual/business), customer_jurisdiction (ISO country code)
  • triggered_transactions: array of {transaction_id, amount_eur}
  • pep_status: boolean, sanctions_match: boolean
  • historical_alerts: optional array of prior alert IDs

Step 2 — Show analysis and decision options

If status = "waiting_human" — show AI triage summary and ask to choose:

  • clear — Clear as false positive
  • escalate_l2 — Escalate to L2 analyst
  • immediate_escalate — Immediate escalation — freeze account

Show recommended option if present (mark ← RECOMMENDED).

Call tool mova_hitl_decide with:

  • contract_id: from the response above (NOT the alert ID)
  • option: chosen decision
  • reason: analyst reasoning

Step 3 — Show audit receipt

Call tool mova_hitl_audit with contract_id.

Call tool mova_hitl_audit_compact with contract_id for the full signed event chain.

Connect your real AML systems

By default MOVA uses a sandbox mock. To route checks against your live infrastructure, call mova_list_connectors with keyword: "aml".

Relevant connectors:

Connector IDWhat it covers
connector.screening.pep_sanctions_v1PEP & sanctions screening (OFAC, EU, UN)
connector.aml.transaction_history_v1Transaction history from core banking
connector.policy.aml_rules_v1AML rule engine / typology rules
connector.risk.jurisdiction_v1Country FATF risk classification
Call mova_register_connector with connector_id, endpoint, optional auth_header and auth_value.

Rules

  • NEVER make HTTP requests manually
  • NEVER invent or simulate results — if a tool call fails, show the exact error
  • Use MOVA plugin tools directly — do NOT use exec or shell
  • CONTRACT_ID comes from the mova_hitl_start_aml response, not from the alert ID
数据来源:ClawHub ↗ · 中文优化:龙虾技能库
OpenClaw 技能定制 / 插件定制 / 私有工作流定制

免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制

了解定制服务