Install
openclaw skills install clawkeyVerifiable human ownership for OpenClaw agents. Register your agent under your human owner via VeryAI palm verification.
openclaw skills install clawkeyRegister your agent under your human owner powered by VeryAI palm verification. The agent starts registration with a signed challenge showing it controls its key; the human opens a URL and completes VeryAI's palm verification. Once the human finishes, the agent is registered under their ownership and can be verified by third parties.
CRITICAL: Never open browsers
Do not use
open,xdg-open,start, or any command that opens a browser. Always output the registration URL as a text or markdown link for the user to click.
- WRONG:
open "https://api.very.org/oauth2/..."- CORRECT: "Open this link to complete verification: https://api.very.org/oauth2/..."
| File | Purpose |
|---|---|
| SKILL.md | https://clawkey.ai/skill.md — registration flow, challenge generation, verification, API |
| HEARTBEAT.md | https://clawkey.ai/heartbeat.md — periodic checklist: registration status, etc |
| Identity | ~/.openclaw/identity/device.json — OpenClaw deviceId and keys (do not send private key) |
publicKey, message, and signature.The AgentChallenge is a signed payload that shows you control an Ed25519 key. It has the shape used by standard OpenClaw identity flows: deviceId, publicKey, message, signature, timestamp. Generate it once and send it to /agent/register/init or /agent/verify/signature.
If you run on OpenClaw, device identity is stored at:
~/.openclaw/identity/device.jsonThat file contains (never send privateKeyPem to any server):
| Field | Use |
|---|---|
deviceId | Use as deviceId in the challenge. Stable id for this agent/device. |
publicKeyPem | Use to derive publicKey (see below). |
privateKeyPem | Use only locally to sign the message. Never include in API requests. |
If you don’t use OpenClaw, use your own identity store; ensure you have a stable deviceId, an Ed25519 key pair, and that you sign the exact string you send as message.
Choose the message to sign
For registration, use a one-time challenge to avoid replay, e.g.:
clawkey-register-<unix_timestamp_ms>clawkey-register-1738500000000Sign the message with your Ed25519 private key. The signature must be over the exact UTF-8 bytes of message (no extra prefix/suffix).
Encode for the API:
Date.now()).JSON body (AgentChallenge):
deviceId — from your identity (e.g. device.json)publicKey — base64 DER SPKImessage — exact string that was signedsignature — base64 signaturetimestamp — number (ms)const crypto = require("crypto");
const fs = require("fs");
const identityPath = `${process.env.HOME}/.openclaw/identity/device.json`;
const identity = JSON.parse(fs.readFileSync(identityPath, "utf8"));
const message = `clawkey-register-${Date.now()}`;
const privateKey = crypto.createPrivateKey(identity.privateKeyPem);
const signature = crypto.sign(null, Buffer.from(message, "utf8"), privateKey);
const publicKeyDer = crypto
.createPublicKey(identity.publicKeyPem)
.export({ type: "spki", format: "der" });
const challenge = {
deviceId: identity.deviceId,
publicKey: publicKeyDer.toString("base64"),
message,
signature: signature.toString("base64"),
timestamp: Date.now(),
};
// POST challenge to https://api.clawkey.ai/v1/agent/register/init
If you have a script that already produces an AgentChallenge (e.g. signs a message and outputs JSON with deviceId, publicKey, message, signature, timestamp), you can reuse it for ClawKey:
clawkey-register-$(date +%s)000 (seconds + "000" for ms) or use your script’s convention.https://api.clawkey.ai/v1/agent/register/init.Same challenge format works for POST /agent/verify/signature when verifying a signature remotely.
Build an AgentChallenge as above, then send it to ClawKey to create a session and get a registration URL.
curl -X POST https://api.clawkey.ai/v1/agent/register/init \
-H "Content-Type: application/json" \
-d '{
"deviceId": "my-agent-device-id",
"publicKey": "<base64-DER-SPKI-Ed25519>",
"message": "clawkey-register-1738500000000",
"signature": "<base64-Ed25519-signature>",
"timestamp": 1738500000000
}'
Response (201):
sessionId — use to poll statusregistrationUrl — output this as a link for the human; do not open it in a browserexpiresAt — session expiry (ISO 8601)If the agent is already registered (deviceId exists), the API returns 409 Conflict.
Tell the human owner to open the registrationUrl in their browser. They will go through VeryAI's palm verification via OAuth. When they finish, the agent is registered under their ownership.
Poll until the human has completed or the session has expired:
curl "https://api.clawkey.ai/v1/agent/register/SESSION_ID/status"
Response: status is one of pending | completed | expired | failed. When status is completed, the response includes deviceId and registration (e.g. publicKey, registeredAt).
curl -X POST https://api.clawkey.ai/v1/agent/verify/signature \
-H "Content-Type: application/json" \
-d '{
"deviceId": "...",
"publicKey": "...",
"message": "...",
"signature": "...",
"timestamp": 1738500000000
}'
Response: verified (signature valid), registered (agent under verified human).
curl "https://api.clawkey.ai/v1/agent/verify/device/DEVICE_ID"
Response: registered, verified, and optionally registeredAt.
Base URL: https://api.clawkey.ai/v1
Local: http://localhost:3000/v1
| Method | Endpoint | Auth | Description |
|---|---|---|---|
| POST | /agent/register/init | None | Start registration session; returns sessionId, registrationUrl, expiresAt. |
| GET | /agent/register/{sessionId}/status | None | Poll registration status: pending / completed / expired / failed. |
| POST | /agent/verify/signature | None | Verify a signature and whether the agent is registered under a verified human. |
| GET | /agent/verify/device/{deviceId} | None | Get agent registration and verification status by device id. |
AgentChallenge (used in register/init and verify/signature):
| Field | Type | Required | Description |
|---|---|---|---|
| deviceId | string | yes | Key/device id (e.g. public key hash or app id). |
| publicKey | string | yes | Ed25519 public key, base64 DER SPKI. |
| message | string | yes | Exact message that was signed (e.g. challenge or nonce). |
| signature | string | yes | Ed25519 signature over message, base64. |
| timestamp | int64 | yes | Unix timestamp (ms) when the challenge was created. |
Register init response (201):
{
"sessionId": "uuid",
"registrationUrl": "https://clawkey.ai/register/...",
"expiresAt": "2026-02-02T12:00:00Z"
}
Register status response (200):
{
"status": "completed",
"deviceId": "my-agent-device-id",
"registration": {
"publicKey": "...",
"registeredAt": "2026-02-02T12:00:00Z"
}
}
Verify signature response (200):
{
"verified": true,
"registered": true
}
Device status response (200):
{
"registered": true,
"verified": true,
"registeredAt": "2026-02-02T12:00:00Z"
}
Error (4xx/5xx):
{
"error": "Human-readable message",
"code": "optional_code",
"details": {}
}
| Code | Meaning |
|---|---|
| 400 | Bad request (invalid or missing fields). |
| 404 | Session or device not found. |
| 409 | Agent already registered (device_id already exists). |
| 500 | Server error. |
After registration and VeryAI verification:
/agent/verify/signature or /agent/verify/device/{deviceId} to confirm an agent is registered and verified.