sev-attestation

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: sev-attestation Version: 1.0.2 The skill bundle is designed to perform AMD SEV-SNP remote attestation, which inherently requires privileged access to `/dev/sev-guest` and network communication with AMD's Key Distribution Service (`kdsintf.amd.com`). All scripts and documentation (including `SKILL.md` and `README.md`) clearly state these requirements and their purpose. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, obfuscation to hide intent, or prompt injection attempts against the agent. The use of `sudo` and interaction with privileged kernel devices are necessary for the stated functionality and are transparently documented in `SKILL.md` and `references/error-codes.md`.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user or agent could treat an attestation PASS as sufficient to release secrets to a VM even if the VM image/configuration has not been confirmed as the expected one.

Why it was flagged

This is a high-assurance claim. The included automated workflow verifies SEV-SNP availability, certificate chain, and report signature, but does not require a known-good MEASUREMENT comparison, nonce/REPORT_DATA comparison, policy.DEBUG check, or TCB acceptance policy before reporting success.

Skill content
Use when ... verifying VM integrity before trusting it with secrets
Recommendation

Treat the script PASS as partial attestation. Before trusting secrets, require explicit checks for expected measurement, challenge nonce/report data, debug policy, and acceptable TCB levels, and update the workflow output to make those limits clear.

What this means

Running the workflow may require root privileges or membership in a privileged SEV device group on the VM.

Why it was flagged

The skill discloses that privileged device access is needed to request SEV-SNP reports. This is expected for the stated purpose, but it crosses a local privilege boundary.

Skill content
- **Root access**: Required to access `/dev/sev-guest`
Recommendation

Run only on the intended VM, prefer the least-privileged sev group where available, and avoid granting broader root access than needed.

What this means

AMD KDS and network logs may see report-derived hardware identity data when certificates are fetched.

Why it was flagged

The script extracts the chip ID and TCB values from the attestation report and sends them to AMD KDS to fetch the chip-specific VCEK certificate. This is expected for SEV-SNP attestation, but it is an external network data flow.

Skill content
CHIP_ID=$(xxd -p -s 416 -l 64 "$REPORT_FILE" | tr -d '\n') ... VCEK_URL="$AMD_KDS_URL/vcek/v1/Milan/${CHIP_ID}?blSPL=${BOOT_LOADER}&teeSPL=${TEE}&snpSPL=${SNP}&ucodeSPL=${MICROCODE}" ... curl -sf "$VCEK_URL"
Recommendation

Use this workflow only when contacting AMD KDS is acceptable, and avoid sharing attestation output or logs more broadly than necessary.

What this means

Users may install and run third-party code from the Rust package ecosystem as part of setup.

Why it was flagged

The skill relies on an external Rust CLI installed without a pinned version in the artifact. This is normal setup for the workflow but leaves dependency provenance and version selection to the user.

Skill content
Install snpguest:
```bash
cargo install snpguest
```
Recommendation

Install snpguest from a trusted source, consider pinning a known-good version, and review dependency installation steps before running privileged attestation commands.