Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Verified Agent Identity
v0.1.0Billions/Iden3 authentication and identity management tools for agents. Link, proof, sign, and verify.
⭐ 1· 176·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name, description, and scripts all implement decentralized identity (DID) creation, signing, linking, and verification for the Billions/iden3 ecosystem — this is coherent. Minor inconsistency: SKILL.md metadata declares required binaries (node, openclaw) but the registry 'Requirements' section earlier lists none; the runtime instructions also require running `npm install` in scripts. Those missing declarations are an information gap but not by themselves malicious.
Instruction Scope
Runtime instructions are limited to creating/listing identities, generating/signing/verifying challenges, and sending messages via the `openclaw` CLI. The scripts read/write files under $HOME/.openclaw/billions and call remote endpoints (RPC, resolver, attestation relay). The SKILL.md includes strict guardrails forbidding manual manipulation of those files, yet the code itself persists unencrypted keys and identity data — this is expected for the skill but worth noting as sensitive scope.
Install Mechanism
There is no formal install spec in the registry (instruction-only), but the README/SKILL.md instructs `cd scripts && npm install`. The package.json and package-lock.json use mainstream npm packages (iden3, polygonid, ethers, etc.), not arbitrary downloads. Installing dependencies via npm is moderate risk (supply-chain exposure); there are no obfuscated external downloads or URL shorteners.
Credentials
The skill does not request environment variables or external credentials, which is appropriate. However, it persistently stores private keys (kms.json) in plaintext JSON under $HOME/.openclaw/billions by default. The code does not explicitly set file permission mode; the README claims 'owner-readable only' but that is not enforced in code. The code also embeds and uses several external endpoints (rpc-mainnet.billions.network, attestation-relay.billions.network, wallet.billions.network, resolver.privado.id) and constructs callback URLs that include signed tokens — all expected for the protocol but they expose signed data to third parties. These practices are sensitive and deserve scrutiny relative to the stated purpose.
Persistence & Privilege
The skill does not request always:true or other elevated platform privileges. It persists cryptographic material and identity state under $HOME/.openclaw/billions and will keep a KMS and stored DIDs across runs; this is normal for an identity tool but increases the impact if the machine or skill is compromised.
What to consider before installing
What to consider before installing:
- This package creates and stores private keys unencrypted in $HOME/.openclaw/billions/kms.json (and other identity files). If you install, expect long-lived plaintext key material on disk. Consider running in a sandbox, using an encrypted KMS, or adjusting file permissions (and verify permissions are actually enforced).
- The skill will call external services (Billions RPC, attestation-relay, a DID resolver). The protocol embeds signed tokens into callback URLs; review those endpoints and privacy implications before using with production keys or real assets.
- The repository expects Node >=20 and the openclaw CLI on PATH. The registry metadata omitted those required binaries — ensure you have the correct runtime installed and trust the openclaw binary before allowing it to send messages.
- Installation requires running `npm install` (package-lock is provided). That pulls standard npm packages; consider auditing dependencies if you require high assurance.
- The code validates inputs and uses execFileSync to call a fixed `openclaw message send` command; it applies tokenization and regex filtering to reduce shell-injection risk — but validation and sanitization are area to review if you expect untrusted input.
- If you are not comfortable with plaintext key storage or with signing callbacks being sent to third-party relays, do not install or only use test identities in a controlled environment.
If you want, I can list the exact files that write or read key material and suggest specific hardening changes (e.g., encrypt kms.json, set restrictive file modes, or switch to an OS-provided secure key store).scripts/shared/utils.js:158
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk97b15fs45y3s9v8thyfdwcsks82vy92
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
