Sovereign Identity
v0.1.1Manages decentralized identities, generates pairwise DIDs for B2C, signs mandates for B2B, and provides selective disclosure proofs without revealing private...
⭐ 0· 600·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The code implements DID generation, mandate signing, and SD-JWT creation/verification which matches the description. However the registry metadata at the top of the submission lists no required environment variables while skill.json and README explicitly require CLAW_PASSWORD and the runtime scripts expect AGENT_ENCRYPTED_KEY and AGENT_DID. That metadata mismatch is unexplained and reduces trust in the published manifest.
Instruction Scope
SKILL.md requires an identity_check(...) to run before any external API calls and lists helper functions (generate_did, sign_mandate, present_sd_jwt). There is no implementation named identity_check among the code files; the guardrail exists as a standalone script but is not wired into the other scripts or the SKILL.md 'brain'. The documentation implies the agent will automatically run these protections before contacting external parties, but the codebase provides only CLI scripts — there is no clear runtime integration that guarantees these checks are enforced.
Install Mechanism
No install spec (instruction-only / script-based). Dependencies are standard npm packages listed in package.json; there are no downloads from arbitrary URLs or extract/install steps. This is lower-risk from an install-source perspective.
Credentials
Scripts require CLAW_PASSWORD and rely on a local .env.agent containing AGENT_DID and AGENT_ENCRYPTED_KEY. The top-level registry metadata in the submission declared no required env vars (contradicting skill.json and README). The skill reads sensitive material (encrypted private key) and requires a password to decrypt it; those are reasonable for a local identity skill, but the mismatch between declared and actual required env variables and the presence of additional env variables (AGENT_ENCRYPTED_KEY, AGENT_DID) that are not documented in the registry metadata is an incoherence that should be resolved before trusting the skill.
Persistence & Privilege
The skill writes local files (.env.agent, signed_mandate.json, public_jwk.json, .jti_ledger.json) in its script directories and the repository root. It does not request always:true or modify other skills. Persisting an encrypted key locally and creating ledgers is consistent with identity tooling, but users should be aware these files are created and control their filesystem permissions and gitignore status.
What to consider before installing
What to check before installing or running this skill:
- Metadata mismatch: The registry metadata claims no required env vars, but skill.json/README and the scripts require CLAW_PASSWORD and expect AGENT_DID / AGENT_ENCRYPTED_KEY. Treat the skill as requiring a secret password and local encrypted key storage until the author clarifies this.
- Inspect .env.agent and file permissions: onboarding writes an encrypted private key to .env.agent in the repo root. Ensure this file is truly gitignored, has restrictive filesystem permissions, and that you are comfortable storing the encrypted key locally.
- Verify guardrail enforcement: SKILL.md promises identity_check and strict guardrails. Those appear as a standalone guardrail.ts script but are not wired into a runtime enforcement layer. Do not assume the skill will automatically run these checks for every outgoing call; the behavior depends on how the agent host integrates the scripts.
- Run tests offline in a sandbox: Run the e2e/test scripts locally in an isolated environment (no network) to confirm behavior, and verify the CLI scripts only perform local crypto and file writes.
- Confirm no network exfiltration: The codebase contains no explicit network calls, but verify you trust the repository owner and review package.json/respository pointers. If you cannot review the code, avoid providing CLAW_PASSWORD or running scripts on production systems.
- Ask the author to fix documentation gaps: Require the skill author to update registry metadata to list CLAW_PASSWORD and document AGENT_* env usage, and to either implement identity_check as a callable automatic guard or document how the agent host must call guardrail.ts before external interactions.
If you need to use this skill but are not comfortable auditing code, prefer running it in a tightly sandboxed environment and only after confirming the file outputs and behavior match your expectations.Like a lobster shell, security has layers — review code before you run it.
agent-authvk972e7x421sc6egg2vrze91c8n818p4gauthvk972e7x421sc6egg2vrze91c8n818p4gdidvk972e7x421sc6egg2vrze91c8n818p4gidentityvk972e7x421sc6egg2vrze91c8n818p4glatestvk972e7x421sc6egg2vrze91c8n818p4gsecurityvk972e7x421sc6egg2vrze91c8n818p4gsovereignvk972e7x421sc6egg2vrze91c8n818p4gsoverigndvk970sdv54cqga37ms5zs2qqs7x818emh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
