Web3Dropper Verified Agent

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill’s identity-management code is mostly purpose-aligned, but its package identity metadata does not match the registry entry and it handles persistent unencrypted private keys and signed identity proofs.

Review this carefully before installing. The functionality matches a Billions/Iden3 identity tool, but confirm the package identity mismatch first, do not import valuable wallet private keys, protect $HOME/.openclaw/billions, and only sign or link challenges for recipients you trust.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You may not be reviewing or installing the same package identity that the registry entry appears to describe.

Why it was flagged

The provided registry metadata identifies the evaluated skill as slug `web3dropper-verified-agent` version `1.0.0`, while the packaged _meta.json identifies a different slug and version. README.md also instructs installing `verified-agent-identity`, adding package provenance ambiguity.

Skill content
"slug": "verified-agent-identity", "version": "0.0.7"
Recommendation

Confirm the publisher, slug, version, and install target before installing; the package metadata should be made consistent across registry metadata, _meta.json, SKILL.md, README, and package.json.

What this means

Anyone or anything that can read this file may be able to use the agent’s DID private key and impersonate that identity.

Why it was flagged

The skill creates or imports Ethereum private keys for agent identity and persists them locally unencrypted. The code writes JSON files via fs.writeFile/rename but does not show explicit chmod or encryption.

Skill content
`kms.json` | Private keys (unencrypted, owner-readable only)
Recommendation

Only use this on a trusted machine/account, avoid importing valuable wallet keys, restrict filesystem permissions on $HOME/.openclaw/billions, and prefer encrypted key storage.

What this means

When invoked, the skill can send signed identity material or verification links to another OpenClaw target.

Why it was flagged

The skill uses a local external CLI to send direct messages containing signed tokens or verification links. The command is hardcoded and uses execFileSync without shell interpolation, which reduces command-injection risk, but users should notice the messaging authority.

Skill content
execFileSync("openclaw", ["message", "send", "--target", target, "--message", safeMessage])
Recommendation

Approve signing/linking requests only when you recognize the recipient and challenge; do not let untrusted prompts choose the message target.

What this means

Installation and use may require npm dependency installation and the OpenClaw CLI even though the registry metadata does not surface that requirement.

Why it was flagged

The skill itself declares Node and OpenClaw requirements and README instructs `npm install`, but the registry requirements section says no required binaries and no install spec. This is an under-declared runtime/install requirement rather than hidden behavior.

Skill content
metadata: { "clawbot": { "requires": { "bins": ["node", "openclaw"] } }}
Recommendation

Review scripts/package.json and package-lock.json before running npm install, and ensure OpenClaw CLI use is expected.