Install
openclaw skills install trust-decay-monitorHelps track how AI skill verification results decay over time. A "verified" badge from 18 months ago may be meaningless today — dependencies updated, new att...
openclaw skills install trust-decay-monitorHelps track the freshness of skill verification results, flagging certifications that have decayed past their useful trust window.
A skill passes a security audit in March 2025. It gets a "verified" badge. Developers see the badge and trust it. Eighteen months later, the badge is still there — but:
The verification was real. The trust it implies is not. Security certifications have a half-life, and most agent marketplaces display them as if they're permanent.
This is trust decay: the gradual erosion of verification validity as the surrounding context changes. It's not that the audit was wrong — it's that the audit's conclusions no longer apply to the current reality.
This monitor computes a trust freshness score for verified skills:
Input: Provide one of:
Output: A trust freshness report containing:
Input: Check trust freshness for verified skill api-auth-helper (verified 2025-01-10)
⏳ TRUST DECAY REPORT — RE-VERIFICATION RECOMMENDED
Skill: api-auth-helper
Verified: 2025-01-10 (408 days ago)
Verifier: @seclab-audits
Trust freshness score: 31/100 (STALE)
Decay factors:
Time decay: -25 points (>12 months since audit)
Dependency churn: -22 points
- jsonwebtoken: 3 major updates (9.0.0 → 12.1.2)
- node-fetch: 2 updates including security patch
- crypto-utils: 1 update with API breaking changes
Ecosystem changes: -15 points
- 2 new JWT-related CVEs published since audit
- Marketplace added "credential-store" permission type
(not evaluated in original audit)
Endpoint stability: -7 points
- skill references api.authprovider.example/v2
- endpoint now redirects to v3 with different response schema
Re-verification urgency: HIGH
Primary driver: 3 major dependency updates + 2 relevant CVEs
since last audit. The JWT library alone has had breaking changes
that could affect how this skill handles token validation.
Recommendation:
- Priority re-audit focusing on JWT handling (CVE-affected)
- Test against current dependency versions
- Verify endpoint redirect doesn't break auth flow
- Check if new "credential-store" permission is relevant
Trust freshness scoring uses heuristic decay models — the actual security impact of time passing depends on factors that can't be fully quantified (e.g., whether dependency updates are security-relevant or just feature additions). Dependency churn counts updates but cannot always determine if an update invalidates the original audit's conclusions. Ecosystem context tracking relies on public CVE databases and marketplace changelogs, which may lag behind actual threats. This tool helps prioritize which verifications need refreshing — it does not replace the actual re-verification process. A low trust score means the audit is stale, not that the skill is compromised.