Self zkID verification

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: self-xyz Version: 1.0.0 The skill bundle provides comprehensive documentation and code examples for integrating the Self identity verification protocol. All instructions and code snippets are directly related to this stated purpose, covering frontend, backend, and smart contract integration. There is no evidence of prompt injection attempts against the agent, data exfiltration, malicious execution, persistence mechanisms, or obfuscation. While the `mock passports` setting in `SelfBackendVerifier` could be a vulnerability if misused in production, it is explicitly documented as 'dev only' and a 'critical gotcha', indicating a configuration risk for the integrator rather than malicious intent from the skill itself.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A production app could unintentionally accept test/mock identities if the setting is not changed.

Why it was flagged

The backend quick-start shows a verifier setting that accepts mock passports; it is labeled development-only, but identity verification would be weakened if copied into production.

Skill content
true,                              // true = accept mock passports (dev only)
Recommendation

Set mock/staging acceptance to false for production, use production endpoint types, and add tests or deployment checks that fail when mock passports are enabled.

What this means

Unexpected or compromised dependency versions could affect the user's application.

Why it was flagged

The guide directs users to install external packages; this is expected for the stated integration, but the example does not pin exact versions.

Skill content
npm install @selfxyz/qrcode @selfxyz/core
Recommendation

Install from official Self sources, pin versions with a lockfile, and review dependency and contract package provenance before production use.

What this means

Proofs and any configured disclosures may reach the developer's backend or contract endpoint.

Why it was flagged

The intended flow sends verification proofs from the Self app to a public endpoint; this is purpose-aligned, but it is a sensitive data boundary.

Skill content
Endpoint must be publicly accessible — Self app sends proof directly to your endpoint. Use ngrok for local development.
Recommendation

Use HTTPS, verify endpoint ownership, keep frontend/backend disclosure configs matched, minimize retained data, and be cautious when exposing local development servers with ngrok.

What this means

Users may otherwise assume that no personal identity attributes can ever be disclosed.

Why it was flagged

The documentation clearly lists optional personal-data disclosures, which users should read alongside the privacy-preserving/zero-knowledge framing.

Skill content
name: true,                              // disclose full name
    dateOfBirth: true,                       // disclose exact DOB
    idNumber: true,                          // disclose passport/ID number
Recommendation

Only request the minimum disclosures needed for the application and clearly explain to end users which attributes will be shared.