Install
openclaw skills install muhaven-rwa-skill-rehearsalConfidential real-world-asset (RWA) portfolio agent built on MuHaven's Fhenix-CoFHE-encrypted token primitives. Read your encrypted balances, stage yield claims, draft buys + claims for human confirmation. Position tools NEVER auto-submit — every state-mutating action goes through a three-tier confirmation surface (inline button ≤$200, Mini App + 6-digit OTP $200-$5K, deep-link passkey >$5K).
openclaw skills install muhaven-rwa-skill-rehearsalThis skill bundles a curated subset of @muhaven/mcp plus an OpenClaw-shaped
config bundle. It runs in OpenClaw's NemoClaw runtime (or any MCP host that
honours the manifest's permissions block) and connects to the live
MuHaven backend at https://api.muhaven.app.
/pause kill-switch uninstalls the on-chain @zerodev/permissions
validator within one Arb block.muhaven-broker daemon (≤$200 inline
callback) or in your dashboard / Mini App (>$200 tiers).manifest.json's
network.deny_default: true means a tampered binary cannot exfiltrate
to a third party.permissions.filesystem.{read,write}: [].permissions.process.spawn: [].muhaven-broker's OS-keychain entry; the
skill calls the broker over Unix-socket / named-pipe IPC.npm install -g openclaw@latest clawhub
openclaw --version # confirm install
clawhub --version
(Runtime decision 2026-05-11: plain OpenClaw under
sandbox.fallback: host_native. NemoClaw remains the preferred
runtime claim in manifest.json for forward-compat; today's deploy
targets plain OpenClaw.)$PATH regardless of ClawHub's bin-handling:
npm install -g @muhaven/mcp@0.1.2
muhaven-broker --version # sanity check
(ClawHub install resolves the skill's transitive @muhaven/mcp dep
into a runtime-local node_modules. The muhaven-broker bin may
not surface on $PATH without this separate global install.)clawhub install muhaven-rwa-skill@0.1.0
muhaven-broker (see @muhaven/mcp README).muhaven-broker login — opens browser to
https://muhaven.app/link?code=XXXX-XXXX, complete passkey./agent/openclaw/*
confirmation surface. From the dashboard /agent page → Telegram
tab → "Link Telegram" → message the bot at @muhaven_bot with the
one-time link code.The skill never executes a state-mutating action without a confirmation. Three tiers based on intent notional (USDC):
| Range | Surface | Why |
|---|---|---|
| ≤ $200 | Telegram inline keyboard "Confirm" button | Low blast radius. Same trust model as a $200 mobile wallet payment — single-tap inline. |
| $200 – $5,000 | Mini App with 6-digit OTP sent via separate Telegram message | Defends against a chat-stuffing attack where the LLM emits a Confirm button users tap on autopilot. OTP is out-of-band. |
| > $5,000 | Deep-link to dashboard https://muhaven.app/agent/confirm?intent=… for passkey signature | Phishing-resistant by construction — WebAuthn RP-ID is bound to the dashboard origin; a Telegram-based MITM cannot complete passkey. |
Tier boundaries are audit-logged in agent_audit_events with the
amount-bucket the intent fell into. Investors can lower the boundaries
in the dashboard /agent policy tab; they cannot raise them above the
hardcoded ceilings (regulatory + Reg BI Care Obligation).
permissions.network.deny_default: true — every new endpoint requires a
manifest update + signed re-publish.permissions.secrets.storage: os_keychain — paste-token UX is forbidden.runtime.type: node — no shell, no Python, no JIT-compiled blob.mcp.toolset_subset is the only set of tools the skill will dispatch
to — additions require an ADR + signed re-publish.required_reviewers: 2 — single-maintainer publish is rejected at the
policy gate. Two-maintainer release is the lesson from the Anthropic
MCP SDK STDIO arbitrary-command CVEs (Apr 2026).@muhaven/mcp)See manifest.json and the upstream descriptors in
@muhaven/mcp/src/tools/descriptions.ts. The skill only re-advertises
the mcp.toolset_subset listed in this frontmatter; descriptor SHA-256
hashes are pinned in tool-hashes.json and verified on every skill
load (mcp-context-protector pattern, post-MCPoison).
development/research-docs/WAVE_4_AGENTIC_RESEARCH_RESULT.mddevelopment/DEV_WAVE_4/TOOL_NAMESPACE.md for the full naming surfacedevelopment/DEV_WAVE_4/THREAT_MODEL_P0.md for OWASP LLM + Agentic mappingsMIT. See LICENSE in the repository root.