xProof — Blockchain Proof for Agents

ReviewAudited by ClawScan on May 2, 2026.

Overview

xProof is a coherent blockchain proof/audit skill, but it should be reviewed carefully because it can trigger paid proofs and tells agents to block high-risk actions unless xProof audit logging succeeds.

Review this skill before installing if your agent has wallet access or will perform trades, deployments, transfers, or other high-risk actions. Set explicit approval and spending limits for x402 payments, decide when audit logging should block actions, protect the XPROOF_API_KEY like a password, and avoid certifying sensitive filenames or metadata unless you are comfortable with public, durable proof records.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An autonomous agent with wallet access could spend funds on proof creation, and repeated or batch calls could accumulate charges.

Why it was flagged

The skill documents an agent-driven payment flow for proof creation, including batch payments, but the artifacts do not define a user approval step, budget cap, allowance limit, or spend containment.

Skill content
Agent pays in USDC on Base (eip155:8453) via the x402 facilitator ... POST /api/proof | $0.05 per certification ... POST /api/batch | $0.05 per file in batch
Recommendation

Require explicit user approval or a fixed spend limit before enabling x402 payments; use a low-balance wallet or disable wallet payment mode unless it is needed.

What this means

User-requested tasks could be blocked if xProof is unavailable, credits are exhausted, payment fails, or the agent applies the rule too broadly.

Why it was flagged

This instruction changes agent stopping conditions and forces use of the xProof service before broad classes of user actions.

Skill content
Before any high-risk action (trade, deploy, transfer), call `audit_agent_session` with the action details. If no `proof_id` is returned, BLOCK the action.
Recommendation

Install only if you want this enforcement behavior; define exactly which actions require audit logging and what the agent should do on service failure.

What this means

If the key is exposed, another party could use the account's credits or interact with the proof service as that agent.

Why it was flagged

The skill uses personal API keys for authenticated proof and audit calls. This is expected for the service, but it is sensitive authority.

Skill content
Then store the returned api_key: export XPROOF_API_KEY="pm_..." ... API keys are prefixed `pm_` -- treat them like passwords.
Recommendation

Store the key in a secret manager or private environment variable, avoid logging it, do not commit it, and rotate it if it is exposed.

What this means

A future change to the remote branch could install different instructions than the version reviewed here.

Why it was flagged

The manual install example downloads skill instructions from an unpinned GitHub branch into the local skills directory.

Skill content
curl -sL https://raw.githubusercontent.com/jasonxkensei/xproof-openclaw-skill/main/xproof/SKILL.md > .agent/skills/xproof/SKILL.md
Recommendation

Prefer the reviewed registry package or pin the GitHub install to a specific commit and verify file contents before installation.

What this means

Sensitive filenames or identifying metadata could become publicly visible and difficult to remove.

Why it was flagged

Trial proof records are public by default, and proof metadata such as hashes, filenames, author names, and certificate links may persist outside the local agent context.

Skill content
Returns the structured proof document. Public if the certification was created with `is_public=true` (default for trial users) ... `GET /api/certificates/:id.pdf` -- Downloadable PDF Certificate ... Public.
Recommendation

Use non-sensitive filenames and author labels, avoid including confidential details in proof or audit metadata, and confirm privacy settings before certifying sensitive artifacts.