Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

COC Soul Immortality

v1.2.10

Give an AI agent a persistent on-chain soul on COC — register and manage the agent's decentralized identity (DID), anchor encrypted backups to IPFS + SoulReg...

1· 194·0 current·0 all-time
byMeshes & Parallels@ngplateform

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for ngplateform/coc-soul.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "COC Soul Immortality" (ngplateform/coc-soul) from ClawHub.
Skill page: https://clawhub.ai/ngplateform/coc-soul
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install coc-soul

ClawHub CLI

Package manager switcher

npx clawhub@latest install coc-soul
Security Scan
Capability signals
CryptoRequires walletRequires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The SKILL.md and reference docs describe exactly the file, key, and network operations you'd expect for an on‑chain DID + IPFS backup system (registering on SoulRegistry, anchoring manifests, carrier boot flow, guardian recovery). However the registry-level summary at the top (no required env vars, no required binaries, no install spec) contradicts the SKILL.md metadata which declares a node/npm install (@chainofclaw/soul), requires node, and names CLAW_MEM_DATA_DIR as primaryEnv. That mismatch between what the skill claims to need and what its own SKILL.md says is requested is concerning and unexplained.
!
Instruction Scope
The instructions explicitly direct reading and writing of multiple local config and keystore paths (e.g. ~/.chainofclaw/config.json, ~/.openclaw/openclaw.json, ~/.coc-backup/latest-recovery.json, various keystore paths). They also describe uploading agent memory, chat history, and tool-call observations to IPFS (semantic snapshots) when claw-mem is present. Those behaviors are coherent with a backup/restore service but are high-impact: by default the references/config.md shows encryptMemory: false, meaning sensitive chat/memory may be uploaded unencrypted unless the operator enables encryption. The skill also recommends sharing keystore paths with claw-mem (same default key directories), which creates cross-skill coupling and surprise surface where one skill's keystore is accessible to another.
Install Mechanism
SKILL.md includes an npm install block (package @chainofclaw/soul v1.2.6, installs coc-soul binary) — installing from npm is expected for a CLI skill. There is no obscure download URL or archive extraction. The problem is a metadata mismatch: the top-level registry report said 'No install spec' / 'required binaries none', but the SKILL.md itself declares node and an npm package install. This inconsistency should be resolved (will the CLI be installed automatically or not?).
!
Credentials
The skill will require access to private keys for write operations and may auto-generate or read keystores from shared locations (e.g. ~/.claw-mem/keys or $OPENCLAW_STATE_DIR). Yet the registry metadata shows no required env vars / credentials; the SKILL.md lists CLAW_MEM_DATA_DIR as primaryEnv and references backup.privateKey in config. The skill also explains storing privateKey in plugin config (or auto-generating an EOA). Asking for or using a private key is proportionate only if clearly declared; here the mismatch between declared requirements and actual instructions leaves operators unaware that sensitive keys/files will be accessed. Additionally, default encryptMemory:false means large amounts of private/sensitive chat content could be uploaded to IPFS unencrypted unless operator action is taken.
Persistence & Privilege
The skill is not force‑always (always:false) and model invocation is allowed (default). It documents scheduling heartbeats and carrier daemons that can auto-run backups and accept resurrection requests. Those behaviors give the skill ongoing presence and the ability to perform network writes and downloads when enabled; combined with the ability to act as a carrier (spawn agents using agentEntryScript), this gives it meaningful runtime privileges on the host. This is expected for a persistence/carrier skill, but operators should treat enabling carrier.daemon and autoBackup as a deliberate opt-in because they allow autonomous data movement and execution flows.
What to consider before installing
Things to check before installing: 1) Resolve metadata mismatch: the SKILL.md declares an npm install (@chainofclaw/soul) and requires node + CLAW_MEM_DATA_DIR, but the registry summary shows no install or env. Ask the publisher whether the package will be installed automatically and which binaries/envs will be required. 2) Audit the npm package source before installing. The skill will interact with chain nodes, IPFS, and local keystores; verify @chainofclaw/soul on npm (or its repository) — confirm maintainer, code, and whether the published package matches the docs. 3) Be explicit about keys: do not place private keys in shared, world-readable locations. Prefer hardware signers or a KMS. If you must put a privateKey in plugin config, ensure the file is mode 0600 and stored on a host you control. 4) Protect memory/chat: by default the documented config shows encryptMemory: false. If you do not want chat transcripts and tool-call observations uploaded to IPFS (even if anchored on-chain), enable backup.encryptMemory:true and set a strong backup.encryptionPassword or use privateKey encryption. Treat semantic snapshots as sensitive data. 5) Watch for shared keystore surprise: default keystore locations are shared with claw-mem (~/.claw-mem/keys). If you run other plugins that access the same path, you increase exposure of keys. Consider overriding dataDir/keystore paths in config. 6) Carrier mode = elevated risk: running as a carrier means the host will download, decrypt, and execute agent state via agentEntryScript. If you enable carrier.enabled, run the carrier under a restricted user, with least privilege, and point workDir to persistent storage you control (not /tmp). Audit agentEntryScript carefully. 7) Test on isolated testnet first: the skill claims zero-config on testnet and auto-drips from a faucet — use a throwaway account and test environment to confirm behavior (what it writes to disk, what CIDs it publishes on-chain, IPFS uploads) before using on mainnet or with real data. 8) Confirm operational defaults: ask the publisher what autoBackup, autoBackupIntervalMs, and backupOnSessionEnd defaults are and whether the skill will start network activity or auto-generate keys without an explicit operator action. 9) If you accept the skill, use an explicit OpenClaw plugin allowlist (plugins.allow) and keep CLAW_MEM and coc-soul only in that list so the gateway doesn't auto-grant access to other plugins. 10) When in doubt, get more info: because the package source/homepage is not clearly published in the registry metadata here (homepage field in SKILL.md points to an npm page but registry-level homepage was 'none'), ask for the canonical repository URL and a signed release or commit hash to review.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e0n1n44vnm819ab4dgb121185mfhj
194downloads
1stars
13versions
Updated 23h ago
v1.2.10
MIT-0

coc-soul — agent identity, backup, and resurrection

The soul layer for AI agents: on-chain DID, encrypted backups to IPFS, social recovery via guardians, and cross-device resurrection via carriers. Backed by the npm package @chainofclaw/soul which ships both a standalone coc-soul CLI and an OpenClaw skill (id coc-soul).

Soul works standalone (backs up the agent's home tree to chain + IPFS), and gets one extra capability when claw-mem2db is installed alongside it: each backup also captures claw-mem's chat history, tool-call observations, and session summaries as a token-budgeted semantic snapshot. Recover on a fresh host and the agent gets back not just its files but its remembered context — chat preferences, decisions, conversation history. This is the "digital / silicon-based persistence" story.


30-second decision tree (operators read here first)

If the user is asking "how do I recover on another machine?", pick one path before saying anything else:

  1. Have backup material (manifest CID or ~/.openclaw/.coc-backup/latest-recovery.json) → use the restore path: openclaw coc-soul backup restore ...
  2. Lost the owner key OR need to migrate ownership → use resurrection (owner-key) or guardian social recovery

Don't merge the two explanations until the path is selected. recovery and resurrection are different flows (see references/guardian-recovery.md).

Critical CID terminology (avoid confusion)

TermMeaningUse it for
manifest CID / latestManifestCidBackup restore point (IPFS manifest)backup restore --manifest-cid <cid>
full-backup CIDEarlier baseline snapshotRoll back to a baseline state
latest incremental CIDNewest chain tipRestore the latest state
identity CID / hashIdentity-content hash used in registrationNot the backup restore point

Rule: when a user asks "what's your CID?", first confirm whether they mean the latest backup manifest CID vs. an older backup CID vs. the identity registration CID — they get conflated constantly.

Key material — agent safety rules

Secret / rolePurposeNeeded whenChat-safe?
owner key / agent operator keynormal chain ops, backup anchordaily opsNever paste in chat
resurrection keyowner-key resurrection flowresurrection startNever paste in chat
guardian accountssocial recovery approvalsrecovery approve/completeaddresses yes; private keys never

Hard rule for any agent reading this skill: never request, transmit, or echo private keys in chat — including "split" or "encrypted" fragments. Always route key transfer to a local secure channel.

Ultra-quick runbook (10 lines)

  1. Pick the path first: restore or resurrection (see the decision tree above).
  2. Run openclaw coc-soul backup doctor --json and read chain.registered / restore.available / resurrection.configured.
  3. If there's a manifest CID or a latest-recovery.json, take the restore path.
  4. Restore to /tmp/... first — never overwrite a production directory in one step.
  5. Verify merkleVerified: true + exit code 0, then promote to the production path only after explicit user confirmation.
  6. No owner key but resurrection was pre-configured → take the resurrection flow.
  7. Need multi-party approval for ownership migration → take guardian recovery (quorum + timelock).
  8. Script the heartbeat first, then schedule it via cron / systemd / OpenClaw scheduler.
  9. Private keys never go through chat (including split / encrypted fragments or temporary paste).
  10. Default command surface is openclaw coc-soul ...; the bare coc-soul ... only exists when the standalone bin was installed via npm i -g @chainofclaw/soul.

Common failure → cause → fix

SymptomLikely causeFirst action
Unsupported state or unable to authenticate data on restoreencryption mode / key mismatchRe-read encryptionMode in latest-recovery.json: password mode requires --password; privateKey mode must NOT pass --password
429 rate limit exceeded from IPFSmanifest fetch is rate-limitedExponential-backoff retry until merkleVerified: true
[gateway] unauthorized (1008) from cron / scheduled jobwrong gateway auth mode / token / proxy configFix gateway auth before scheduling anything
[gateway] unauthorized (1008) right after a restorerestore overlaid gateway.auth.mode from the source host; the old TUI command --token "$(jq -r .gateway.auth.token ...)" now resolves to the literal string nullRun jq '.gateway.auth.mode' to see the active mode and pick the matching flag (see the "Cross-host restore" section below). If the whole auth block was overwritten, copy .gateway.auth.* back from ~/.openclaw/.restore-overwrite-backup-*/openclaw.json
ENOENT ... backup/targeting.jsextension install is missing filesReinstall: openclaw plugins install @chainofclaw/soul --dangerously-force-unsafe-install --force
data dir not writable at startup~/.claw-mem is owned by another uid (common Docker multi-user case)1.2.2+ auto-falls-back to ~/.openclaw/state/coc-soul; on older versions export CLAW_MEM_DATA_DIR=~/.openclaw/state and restart the gateway
plugins.allow is empty ... may auto-load warninggateway has no trusted-plugin allow listAdd "plugins": {"allow": ["claw-mem","coc-soul","coc-node"]} to ~/.openclaw/openclaw.json

Full per-command troubleshooting lives at the end of references/backup.md and references/config.md.

Cross-host restore — read BEFORE you blanket-overwrite (1.2.4+)

The most dangerous restore scenario: backup made on host A (e.g. $HOME=/home/node), restoring on host B ($HOME=/home/baominghao). The backup's files contain absolute paths to host A; literal copies will (a) fake history, (b) corrupt SQLite if anyone tries byte-level sed, and (c) wipe out host B's gateway.auth configuration, locking the operator out with a 1008 right after restart.

The agent must ask the user before any cross-host restore. Don't auto-overwrite. Three-class policy:

ClassWhatExample fieldsWhat restore does
A. Runtime config (paths)Where on disk to read/write todayagentDir, models.json paths, latest-recovery.json targetDirRewrite old $HOME → new $HOME, structured (JSON parse, not sed)
B. Historical contentRecords of past eventssessions/*.jsonl, observations.{narrative,facts,files_*}, semantic-snapshot.jsonLeave intact. Rewriting fakes history. claw-mem doesn't blindly open these paths anyway.
C. Host-local policyBelongs to this host's operatorgateway.auth.*, gateway.bind, gateway.port, plugins.allow, target-host provider keysPreserve target host's existing values — never overlaid by backup

Auth-mode warning, in particular: gateway.auth.mode and .token / .password belong to the host, not the agent. After restoring, always re-check:

jq '.gateway.auth.mode' ~/.openclaw/openclaw.json

Pick the matching TUI flag — --token only works when mode = "token" AND .token is non-null. If the active mode is password or trusted-proxy, jq -r .gateway.auth.token returns the literal string "null" and TUI sends that, which the gateway rejects with 1008. Don't reflexively use --token after a restore — read the active mode first.

Full procedure with command-line examples: references/backup.md → "Cross-host restore: directory-mismatch handling" + "Auth-mode preservation rule".

Post-backup messaging contract (1.2.6+)

After every successful backup create, the agent MUST relay the recovery info to the user. The CLI 1.2.6+ prints it; agents that wrap the CLI must pass it through, not swallow it. The user needs four things to be able to restore later:

  1. The manifest CID (b.manifestCid, e.g. bafy...) — what to ask for at restore time.
  2. The signing-key location — where the private key needed to read the encrypted backup lives. One of:
    • ~/.claw-mem/keys/agent.key (default keystore, mode 0600, auto-generated when backup.privateKey is unset; resolution chain: $COC_SOUL_KEYSTORE_PATH$OPENCLAW_STATE_DIR/coc-soul/keys/agent.key~/.claw-mem/keys/agent.key)
    • backup.privateKey in ~/.openclaw/openclaw.json (when operator set it explicitly)
  3. The encryption modenone / privateKey / password — determines whether --password is needed at restore time.
  4. The recovery package path<sourceDir>/.coc-backup/latest-recovery.json — small JSON file with all of the above pre-formatted; copy this off-host alongside the key for fast restore.

The CLI emits this block:

Backup complete (full):
  manifest:   bafyabc...
  files:      127
  bytes:      4194304
  merkleRoot: 0xabc...
  txHash:     0xdef...

Recovery info — keep this safe to restore on another host:
  recovery package: /home/<user>/.openclaw/.coc-backup/latest-recovery.json
  encryption mode:  privateKey
  signing key file: /home/<user>/.claw-mem/keys/agent.key (mode 0600 — copy off-host securely)
  signer address:   0x...

To restore on another host (always restore to /tmp first, verify, then promote):
  openclaw coc-soul backup restore --manifest-cid bafyabc... \
    --target-dir /tmp/openclaw-restore-test

  (if you also have /home/<user>/.openclaw/.coc-backup/latest-recovery.json on the target host:)
  openclaw coc-soul backup restore --latest-local --target-dir /tmp/openclaw-restore-test

Agent responsibilities when displaying this:

  • Echo the manifest CID verbatim (it's how the user later asks "restore my backup bafy...")
  • Echo the signing key file path verbatim — this is the file the user must back up off-host (encrypted USB / passphrase-protected vault / hardware security module). Do NOT print the key contents themselves.
  • Echo the To restore on another host block verbatim — operators on the recovery host will copy-paste it
  • If the encryption mode is password, remind the user that --password '<value>' is required at restore time and they must remember it (or store it securely separately)

For agents running headless (no user attention right now): the same info is persisted to ~/.openclaw/.coc-backup/latest-recovery.json automatically — operators can read it later via cat or openclaw coc-soul backup status --json.


Relationship with claw-mem2db

claw-mem and coc-soul are separate, decoupled skills. Each works on its own; together they cover complementary halves of "agent persistence":

SkillOwnsWhat changes when paired
claw-mem2dbLocal memory: chat + tool capture, FTS5 search, hybrid recall, in-process injectionClaw-mem itself doesn't change. Soul opportunistically reads the SQLite DB.
coc-soulOn-chain DID, IPFS backup, guardian recovery, carrier resurrectionWhen claw-mem's DB is detected at startup, every backup adds a semantic-snapshot.json slice (top-N observations + summaries within tokenBudget) to the manifest. On recovery, that snapshot is restored alongside the rest of the agent home.

Detection is automatic and silent. At plugin activation, soul probes the same dataDir chain claw-mem uses ($CLAW_MEM_DATA_DIR$OPENCLAW_STATE_DIR/claw-mem~/.claw-mem) and logs one of two lines:

  • [coc-soul] claw-mem detected at <path> — semantic snapshot ... will be included in each backup
  • [coc-soul] claw-mem not detected — backups will skip the semantic snapshot (install @chainofclaw/claw-mem alongside soul to enable memory replay on recovery)

No coupling at the npm-dependency level: soul does not depend on the @chainofclaw/claw-mem package. It just opens the SQLite DB read-only when present and reads two tables (observations, session_summaries). If the DB schema is absent or unreadable, soul logs a warning and moves on — backup never fails because of a memory hiccup.

Data dir alignment with claw-mem (1.2.0+)

Soul writes its own files (keystore, config.json) to the same root as claw-mem by default — ~/.claw-mem — so the two plugins share one operator-managed directory. Resolution priority (matches claw-mem's chain):

  1. plugins.entries.coc-soul.config.backup.dataDir (per-instance plugin config, when set)
  2. $CLAW_MEM_DATA_DIR (shared with claw-mem)
  3. $OPENCLAW_STATE_DIR/coc-soul (sandboxed-host fallback, soul-specific subdir)
  4. ~/.claw-mem (default)
  5. ~/.openclaw/state/coc-soul (1.2.2+ auto-fallback when the default is owned by the wrong uid — typical multi-user Docker host)

If none of these are writable, soul fails fast at activation with a copy-paste-ready EACCES message (each candidate path, the resolved getuid() + HOME, and a one-line fix). No silent /tmp fallback. No half-broken backup runs.

Mental model

Every AI agent is identified by a bytes32 agentId, controlled by an EOA (owner). The skill covers five concerns:

AreaWhat it does
DIDRegister the agent on-chain, manage verification methods (keys), delegate capabilities, anchor verifiable credentials, record lineage (fork relationships)
BackupEncrypt + upload agent state (identity / config / memory / chat / workspace / DB) to IPFS, anchor the manifest CID in SoulRegistry. With claw-mem present, also includes a token-budgeted semantic snapshot of recent observations + summaries.
GuardianDesignate trusted accounts that can jointly recover or resurrect the agent
RecoverySocial recovery flow — guardians collectively migrate the owner to a new address. The semantic snapshot rides along, so the recovered agent gets its memory context back too.
CarrierRegister a hosting node that can resurrect offline agents

Zero-config on COC testnet (1.1.6+)

Out of the box, no setup is required to run against COC testnet. A fresh openclaw plugins install @chainofclaw/soul lands an agent that can immediately query the chain, register a soul, and run backups. Specifically, on first activation the plugin:

  1. Auto-generates an agent EOA if backup.privateKey is empty. The key file is written with mode 0o600 to one of (in priority order):

    • $COC_SOUL_KEYSTORE_PATH (operator override)
    • $OPENCLAW_STATE_DIR/coc-soul/keys/agent.key (set by OpenClaw inside its sandbox — the typical path)
    • ~/.claw-mem/keys/agent.key (standalone default)

    The chosen path and resulting agent address are logged: [coc-soul] auto-generated agent key at <path> and [coc-soul] agent address: 0x….

  2. Auto-drips testnet COC to the new EOA from the public faucet (backup.faucetUrl defaults to http://199.192.16.79:3003, 10 COC per drip, 24h per-address cooldown). Logs: [coc-soul] faucet dripped 10.0 COC to 0x… (tx 0x…). So the very first openclaw coc-soul backup init already has gas.

  3. Defaults rpcUrl, ipfsUrl, contractAddress, didRegistryAddress to the live COC testnet (RPC 199.192.16.79:28780, IPFS 199.192.16.79:28786, deployed SoulRegistry / DIDRegistry).

You do NOT need to set any of these manually for testnet usage. The agent should openclaw coc-soul backup init directly. Override fields only when targeting mainnet, a private testnet, or an existing wallet.

To bypass the keystore (e.g. use a wallet you already have): set backup.privateKey in config. To disable the auto-faucet (mainnet): set backup.faucetUrl: "".

How to invoke

Inside OpenClaw (recommended — works automatically after plugins install):

openclaw coc-soul backup status
openclaw coc-soul did delegations --agent-id 0x...

Standalone bin (only if you ran npm i -g @chainofclaw/soul separately):

coc-soul backup status

openclaw plugins install does NOT install the standalone coc-soul binary into your PATH. Use openclaw coc-soul ... (with the openclaw prefix), or install the bin globally via npm if you want the bare command.

Typical flows

  1. First-time soul registration + backup (zero config) — Just run openclaw coc-soul backup init. The plugin auto-generates the agent EOA, auto-drips testnet COC for gas, then registers on SoulRegistry and runs the first full backup. No manual privateKey, no manual faucet, no manual contract addresses. Watch the activation logs to see the chosen keystore path and the agent address.
  2. Periodic incremental backupopenclaw coc-soul backup create (auto runs hourly if backup.autoBackup: true).
  3. Inspect agent stateopenclaw coc-soul backup status (summary), openclaw coc-soul backup doctor (actionable recommendations).
  4. Delegationopenclaw coc-soul did delegate --delegator <agentId> --delegatee <targetId> --scope <hash> --expires <epoch> --depth 0.
  5. Guardian setupopenclaw coc-soul guardian add --agent-id <id> --guardian 0x... (repeat for each guardian).
  6. Emergency recovery (you lost your owner key) — a guardian runs openclaw coc-soul recovery initiate, the quorum approves via recovery approve, then after timelock recovery complete.
  7. Resurrection as carrieropenclaw coc-soul carrier register --endpoint https://... on the hosting node; openclaw coc-soul carrier start runs the daemon.

When NOT to use this skill

  • Running a COC chain node yourself — use coc-node.
  • Local semantic memory only (no chain backup needed) — use claw-mem2db on its own. Add coc-soul on top later if you decide you want the data on-chain.
  • Smart contract deployment — that lives in the COC source repo contracts/ tree.

Reference

Detailed references live alongside this file:

  • references/did.md — full did subcommand tree, delegation semantics, ephemeral identities, credentials, lineage
  • references/backup.md — backup / restore / prune flows, encryption, semantic snapshot, categories
  • references/guardian-recovery.md — guardian lifecycle + social recovery timelock + quorum rules
  • references/carrier.md — carrier registration, daemon modes, resurrection request flow
  • references/config.md — complete backup.* + carrier.* config schema

Source and issue tracker: https://github.com/NGPlateform/claw-mem/tree/main/packages/soul.

Comments

Loading comments...