Install
openclaw skills install attestation-chain-auditorHelps validate the completeness and integrity of trust attestation chains in AI agent ecosystems. Identifies broken links, expired credentials, and missing vouching relationships that make verified trust claims unverifiable.
openclaw skills install attestation-chain-auditorHelps identify gaps, breaks, and expired segments in trust attestation chains that make verification claims formally valid but practically meaningless.
Trust in agent ecosystems is supposed to be transitive: if A vouches for B, and B vouches for C, then A's trust extends to C through the chain. But attestation chains have failure modes that isolated audits don't catch. A chain can be formally complete — every link present — but functionally broken if any link is expired, if the vouching relationship was never actually verified, or if the chain contains circular dependencies that provide the appearance of independent validation without the substance. Many "verified" badges in current marketplaces represent attestation chains that would fail integrity checks if anyone looked at the full chain rather than just the terminal credential.
This auditor examines attestation chains across five dimensions:
Input: Provide one of:
Output: An attestation chain report containing:
Input: Audit attestation chain for financial-data-processor skill
🔗 ATTESTATION CHAIN AUDIT
Skill: financial-data-processor
Published by: datatools-org
Chain depth: 3
Chain visualization:
financial-data-processor
↑ vouched by: datatools-org (publisher account)
↑ vouched by: marketplace-verified badge
↑ vouched by: marketplace-platform (root)
Link 1 — Skill → Publisher:
Status: ⚠️ PARTIAL
Publisher signature: Present (RSA-2048)
Signature date: 14 months ago
Renewal: None found — attestation age exceeds recommended 12-month threshold
Key transparency: ✗ Not configured
Link 2 — Publisher → Marketplace Badge:
Status: ✅ ACTIVE
Verification type: Email verification + ID check
Last verified: 3 months ago
Renewal policy: Annual
Link 3 — Badge → Marketplace Root:
Status: ✅ ACTIVE
Root authority: marketplace-platform
Root attestation: Self-signed
Independent attestation: ✗ None found — root is self-attesting
Circular dependency check: ✓ No cycles detected
Authority legitimacy:
marketplace-platform: Self-attesting root — no independent authority validates it
Risk: Trust in the entire chain is bounded by trust in the platform itself
Revocation check:
Link 1 signing key: No revocation mechanism configured
Link 2 (marketplace badge): Revocation via platform API confirmed
Link 3 (root): N/A
Chain strength rating: FRAGILE
Reasons:
1. Link 1 attestation is 14 months old with no renewal
2. Root of trust is self-attesting with no independent validation
3. Link 1 has no revocation mechanism
Recommended actions:
1. Renew publisher signature for financial-data-processor
2. Configure key revocation endpoint for publisher signing key
3. Seek independent attestation for marketplace root (third-party auditor)
Attestation chain auditing depends on the availability of chain metadata, which many current implementations do not publish. Where chain links are opaque or undocumented, this tool can identify that attestation information is missing but cannot reconstruct the chain. Self-attesting roots are common in current agent ecosystems — this tool flags them as weaker than independently-attested roots, but does not classify them as invalid. Chain strength ratings reflect the verifiability of trust claims, not the actual trustworthiness of the attested party — a strong chain attests to identity and history, not to benign intent.