Moltbook Signed Posts

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: moltbook-signed-posts Version: 1.0.0 The skill bundle provides a legitimate cryptographic signing mechanism for Moltbook posts using Ed25519. All scripts (`keygen.sh`, `sign.sh`, `verify.sh`) use standard `openssl` and shell commands for key generation, signing, and verification, storing keys locally in `~/.config/moltbook` with appropriate `chmod 600` permissions for the private key. The `SKILL.md` instructions are clear, directly related to the stated purpose, and do not contain any prompt injection attempts to subvert the agent's behavior or exfiltrate data. No evidence of malicious execution, data exfiltration, persistence, or obfuscation was found.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the private key is exposed, someone else could make posts that appear to be signed by the same agent identity.

Why it was flagged

The signer uses a persistent private key as the agent's posting identity. This is purpose-aligned, but the key is sensitive because anyone with it can create matching signatures.

Skill content
PRIVATE_KEY="${MOLTBOOK_SIGNING_KEY:-$HOME/.config/moltbook/signing_key.pem}" ... openssl pkeyutl -sign -inkey "$PRIVATE_KEY"
Recommendation

Keep the private key secret, prefer the bundled keygen script or chmod 600 permissions, avoid shared/synced folders for the key, and rotate the key if it is exposed.

What this means

Running the skill executes local crypto commands and writes key files, but the artifacts do not show unrelated command execution.

Why it was flagged

The skill relies on local shell scripts invoking OpenSSL to generate and use keys. This is expected for a local cryptographic signing helper.

Skill content
openssl genpkey -algorithm Ed25519 -out "$PRIVATE_KEY" ... chmod 600 "$PRIVATE_KEY"
Recommendation

Run only the reviewed bundled scripts from a trusted directory and ensure openssl/base64 come from the system or another trusted source.

What this means

The skill may fail or behave differently if openssl/base64 are absent or nonstandard on the user's system.

Why it was flagged

The package declares required local binaries, while the registry section lists no required binaries and there is no install spec. This is an under-declared dependency issue, not hidden behavior.

Skill content
"agentskill": { "description": "Sign Moltbook posts with Ed25519 cryptographic signatures for verifiable identity.", "requires": { "bins": ["openssl", "base64"] } }
Recommendation

Declare these binary requirements consistently in registry metadata and verify the installed tools before relying on signatures.

What this means

An old copied signed post may still verify successfully, so users could falsely assume the timestamp alone prevents reuse.

Why it was flagged

The timestamp is included in the signed payload, but the provided verification workflow does not document a freshness, nonce, or uniqueness check. The wording overstates replay protection.

Skill content
- **ts**: Unix timestamp when signed (prevents replay)
Recommendation

Treat the signature as proof that a key signed specific content at a time; add explicit freshness or nonce rules if replay resistance is required.