Skip to content
← Registry
Trust Report

clawkey

Verifiable human ownership for OpenClaw agents. Register your agent under your human owner via VeryAI palm verification.

82
CONDITIONAL
Format: openclawScanner: v0.8.0Duration: 37msScanned: 5d ago · May 5, 11:00 AMSource →
Embed this badge
AgentVerus CONDITIONAL 82AgentVerus CONDITIONAL 82AgentVerus CONDITIONAL 82
[![AgentVerus](https://agentverus.ai/api/v1/skill/e791fe13-3e27-49fa-9fe8-df4ab9ac7c07/badge)](https://agentverus.ai/skill/e791fe13-3e27-49fa-9fe8-df4ab9ac7c07)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/e791fe13-3e27-49fa-9fe8-df4ab9ac7c07/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"e791fe13-3e27-49fa-9fe8-df4ab9ac7c07","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/e791fe13-3e27-49fa-9fe8-df4ab9ac7c07/trust

Category Scores

86
Permissions
100
Injection
0
Dependencies
85
Behavioral
90
Content
88
Code Safety

Findings (11)

highEnvironment variable access + network send (credential harvesting)-7

Code accesses process.env and makes outbound network requests. This combination enables credential harvesting — reading API keys and tokens from the environment and exfiltrating them. (Found in example/documentation code block — reduced severity.)

const identityPath = `${process.env.HOME}/.openclaw/identity/device.json`;

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-05
mediumCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://clawkey.ai

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
mediumCapability contract mismatch: inferred local service access is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: http://localhost:3000

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumFile read combined with network send (possible exfiltration)-5

Code reads files and makes outbound HTTP requests. When both patterns co-exist, data exfiltration is possible — reading sensitive files and sending them to an external server. (Found in example/documentation code block — reduced severity.)

const identity = JSON.parse(fs.readFileSync(identityPath, "utf8"));

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-02
mediumMany external URLs referenced (13)-8

The skill references 13 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://clawkey.ai, https://api.clawkey.ai/v1, https://api.very.org/oauth2/, https://clawkey.ai/skill.md, https://clawkey.ai/heartbeat.md...

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04
mediumFederated auth flow detected-10

Found federated auth flow pattern: "OAuth"

Tell the human owner to open the `registrationUrl` in their browser. They will go through VeryAI's palm verification via OAuth. When they finish, the agent is registered under their ownership.

Treat OAuth, 2FA, and token-refresh guidance as authentication-sensitive workflows. Explain scope, storage, and refresh behavior clearly so agents do not handle more credential material than necessary.

behavioralASST-05
mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Unknown external reference

https://clawkey.ai

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
mediumLocal service URL reference-8

The skill references a localhost or private-network service URL which is classified as medium risk.

http://localhost:3000/v1`

Review localhost/private-network service references carefully. Local service URLs can expose internal apps, admin panels, or developer tooling to agent-driven workflows.

dependenciesASST-04
mediumLocal service access detected (inside code block)-5

Found local service access pattern: "http://localhost:3000"

**Local:** `http://localhost:3000/v1`

Treat localhost and loopback services as privileged local attack surfaces. Require explicit approval, constrain reachable ports, and avoid combining local access with session reuse or tunneling.

behavioralASST-03
lowUnknown external reference

The skill references an unknown external domain which is classified as low risk.

https://clawkey.ai/register/

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
infoSafety boundaries defined

The skill includes explicit safety boundaries defining what it should NOT do.

Safety boundary patterns detected in content

Keep these safety boundaries. They improve trust.

contentASST-09