Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Vouch

v1.0.1

Signs, verifies, and manages cryptographic identity for AI agents using the Vouch CLI on Base. Use when an agent needs to: set up identity and register an ac...

0· 460·0 current·0 all-time
byJack Morgan@jackpmorgan
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The SKILL.md clearly requires the vouch binary and jq on PATH and describes flows that create and store private keys and API keys, but the registry metadata lists no required binaries or environment variables. That mismatch is incoherent: a vouch CLI skill should declare the vouch and jq requirements and any primary credential expectations.
Instruction Scope
The instructions stay within the stated purpose (onboarding, linking identities, signing/verifying, delegating runtime keys). However the guide tells agents/operators to generate wallets and persist private keys under ~/.vouch/keys and to pass keys/API tokens on the CLI (e.g., --wallet-key, --api-key). Those behaviors are expected for such a tool but are high-risk operations for secret exposure if an agent constructs or logs commands containing secrets.
!
Install Mechanism
The recommended install is curl -fsSL https://vouch.directory/install.sh | bash. Piping an arbitrary remote script to bash is a high-risk pattern; the URL is not a well-known release host (e.g., GitHub release tarball) and there is no checksum or local verification step described. This increases risk that arbitrary code could be written/executed.
!
Credentials
SKILL.md references API keys, runtime keys, and wallet private keys but the skill declares no required environment variables or primary credential. The skill also grants allowed-tools Bash(vouch:*), which lets an agent form commands that could include secrets. The set of credential handling behaviors should be explicitly declared and justified in registry metadata.
Persistence & Privilege
The skill does not request always:true and does not modify other skills. It does instruct use of the vouch CLI which writes local files (~/.vouch/config.toml, ~/.vouch/keys/) — expected for this purpose. Users should consider file permissions and whether storing private keys on the agent host is acceptable.
What to consider before installing
This instruction bundle describes a legitimate CLI for onchain agent identity, but there are red flags you should address before installing or enabling it. What to check before installing: - Do not blindly run curl | bash. Inspect https://vouch.directory/install.sh and verify its contents and provenance; prefer a release tarball with checksum or an official package manager if available. - Metadata mismatch: the skill's registry entry lists no required binaries or env vars, but the instructions require the vouch binary and jq and describe using API keys and private keys. Ask the publisher to update metadata so you can enforce policy (e.g., require vouch/jq, declare primary credential). - Secret handling: the CLI stores keys at ~/.vouch/keys and supports passing keys/API tokens on the CLI. Avoid embedding long-lived private keys or API keys in agent-generated commands or logs. Prefer short-lived delegated runtime keys and restrict agent allowed_commands in config.json. - Least privilege: run the CLI and the agent in an isolated environment (dedicated VM/container) with strict filesystem permissions if you must allow signing keys on-host. - Configuration: restrict config.json allowed_commands to only the subcommands you trust the agent to run; consider removing commands that accept raw private keys (e.g., flags like --wallet-key or --api-key) from allowed_commands. If you cannot verify the install script or are uncomfortable with local key storage, do not install this on production hosts. If you want to proceed, do a manual install/inspection, confirm network endpoints, and audit the install script and the vouch binary before granting the agent permission to execute vouch commands.

Like a lobster shell, security has layers — review code before you run it.

latestvk973s7fx96jym14hd7gktg5tj1825bg2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments