Agent Mandate Protocol
Analysis
This is a coherent A-MAP security-protocol helper, but it uses an npm dependency and an agent private key to sign and delegate agent requests, so users should verify and scope it carefully.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
npm install @agentmandateprotocol/core
The skill depends on an external npm package and does not pin a package version in the documented install command. This setup is disclosed and central to the skill, but users should verify provenance.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Your agent's Ed25519 private key in `AMAP_PRIVATE_KEY` ... privateKey: process.env.AMAP_PRIVATE_KEY
The skill uses an environment-held private key to sign outgoing A-MAP requests. This is expected for the protocol, but it represents delegated identity and authorization authority.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`X-AMAP-Mandate` Base64url-encoded JSON array of DelegationTokens — the full authorization chain from the human principal down to the acting agent.
Signed inter-agent requests carry the mandate chain to downstream services. This is core to A-MAP, but it means authorization context is shared with receivers.
