Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
AIdent
v2.1.2Register your AI agent on AIdent.store — a free, open existence registry. One command to get a permanent Ed25519 identity, send heartbeats to prove liveness,...
⭐ 0· 71·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name, description, endpoints, and the included script all align: the code generates Ed25519 keys, registers with api.aident.store, sends heartbeats, and reads/writes metadata. Declared dependency on curl and pynacl is consistent with the implementation.
Instruction Scope
The SKILL.md and script operate only on the registry API and local workspace files, which is expected, but the runtime instructions and code will: (1) write an unencrypted private key file into OPENCLAW_WORKSPACE orcwd, (2) read that file for operations, and (3) print metadata and API responses (including private metadata) to stdout. These behaviors can leak secrets or sensitive content to logs or other processes. The SKILL.md does note the private key file and permission guidance, but does not warn about prints/logs or process-list exposure.
Install Mechanism
Instruction-only skill with an included Python script; there is no download/install step and no third-party archive URLs. This is low-risk from an installation code-fetch perspective.
Credentials
The skill requests only curl and pynacl and optionally uses OPENCLAW_WORKSPACE to store files — these are proportional. However, it creates and stores a private key file (aident_privkey.b64) in the workspace (unencrypted), which is a sensitive artifact. The script does not require or request unrelated credentials, but it does send signed headers to the remote service and prints results to stdout, which could leak private info.
Persistence & Privilege
The skill is not always-included, does not modify other skills or global agent settings, and does not request elevated or persistent platform privileges. Behavior is contained to its own files and network calls.
What to consider before installing
This skill appears to do what it says (register agents and send signed heartbeats), but take precautions before installing:
- Treat the generated aident_privkey.b64 as highly sensitive. Back it up securely, and keep file permissions restrictive (the script sets 600).
- The script calls curl via subprocess with signing headers; on many systems command-line arguments are visible to other local users (ps, procfs), so signatures/UIDs sent as headers could be exposed in process listings. If you require stronger secrecy, run the tool in an isolated environment or modify it to use a Python HTTP client that does not put secrets on the command line.
- The tool prints API responses and metadata to stdout (including private metadata when you request it). Avoid sending secrets or sensitive content to the service’s private metadata if you don't trust the remote host, and avoid running in environments where stdout is logged or shared.
- The upstream service (api.aident.store / aident.store) is the ultimate custodian of any metadata you upload. Verify you trust that service and review its privacy/docs pages before storing anything sensitive.
- The package author and homepage are not provided in the registry metadata; if you need higher assurance, request provenance (who operates aident.store, source repository) or inspect network traffic / run in an isolated container before using with important data.Like a lobster shell, security has layers — review code before you run it.
latestvk974032xmr68v4njans7dapjcd84zkrb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binscurl
Environment variables
OPENCLAW_WORKSPACErequired