Archon Keymaster

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill appears coherent for Archon DID and cryptographic workflows, but it legitimately handles wallet secrets, identity authority, external network messaging, and an unpinned npx CLI.

This skill is not suspicious based on the provided artifacts, but install it only if you intend to let it manage an Archon DID wallet. Protect `~/.archon.env`, the wallet file, and the recovery mnemonic; verify the `@didcid/keymaster` package before use; and ask for explicit confirmation before any command that publishes, revokes, transfers, deletes, or changes group membership.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the wallet file, passphrase file, or displayed recovery mnemonic is exposed, someone could control or impersonate the user's Archon identity.

Why it was flagged

The skill explicitly requires and stores the wallet passphrase and accesses the encrypted wallet, which is expected for DID management but gives the scripts authority to sign, decrypt, issue, revoke, and act as the user's DID.

Skill content
`ARCHON_PASSPHRASE` is stored in `~/.archon.env` ... `~/.archon.wallet.json` — encrypted wallet containing DID private keys
Recommendation

Use a dedicated wallet/persona where possible, keep `~/.archon.env` and the wallet private, never commit them, and avoid running identity-changing commands without explicit intent.

What this means

A changed or compromised npm package could affect wallet operations or access sensitive environment variables during script execution.

Why it was flagged

The scripts run the external `@didcid/keymaster` npm package through `npx` without a version pin in the provided artifacts; this is central to the skill, but the package will execute with wallet-related environment variables.

Skill content
WALLET_OUTPUT=$(npx @didcid/keymaster create-wallet 2>&1)
Recommendation

Verify the upstream package and maintainer, consider pinning an audited version, and avoid running the scripts in environments with unrelated secrets.

What this means

An agent or user could publish, revoke, transfer, or otherwise mutate DID-related records if they run the wrong command or use the wrong target DID.

Why it was flagged

The skill exposes identity and registry mutation commands, including public credential publishing; this is purpose-aligned, but it can have lasting privacy or reputation effects.

Skill content
This makes the credential publicly visible in your manifest ... npx @didcid/keymaster publish-credential "$CREDENTIAL_DID"
Recommendation

Require explicit user confirmation for publish, revoke, transfer, delete, and group-membership changes, and verify all DIDs and aliases before running them.

What this means

Encrypted content and associated metadata may leave the local machine and be stored or routed through Archon infrastructure or peer networks.

Why it was flagged

The skill sends DID messages or registry data through external Archon network components; this is disclosed and core to the purpose, but users still depend on correct recipient selection and the upstream encryption implementation.

Skill content
Network: Data is encrypted before transmission to Archon gatekeeper/hyperswarm. Only intended recipients can decrypt.
Recommendation

Double-check recipient DIDs and aliases, avoid uploading sensitive files as plain assets unless you intend to share them, and use the encryption-specific commands for private data.