Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Audits ERC-8004 agents by analyzing metadata, endpoints, payment configs, and reputation to identify security risks and generate detailed reports.
Audits ERC-8004 agents by analyzing metadata, endpoints, payment configs, and reputation to identify security risks and generate detailed reports.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Scans ERC-8004 agents for security vulnerabilities and generates comprehensive security reports.
This skill audits ERC-8004 Trustless Agents by querying the Identity Registry and analyzing agent metadata for common security issues. It helps identify potentially malicious or misconfigured agents before interacting with them.
Identity Registry Query: Fetches agent metadata from the ERC-8004 Identity Registry Metadata Validation: Checks for missing, empty, or suspicious metadata Endpoint Security: Analyzes service endpoints for red flags x402 Payment Analysis: Validates payment configuration Reputation Check: Queries the Reputation Registry for feedback signals Verification Status: Checks if endpoints are verified via domain control
# Run the audit script directly with Node.js node scripts/audit.js <agent-address> [options] # Options: # --rpc <url> RPC endpoint URL (default: https://eth.llamarpc.com) # --chain <id> Chain ID (default: 1) # --output <file> Output file for JSON report # --verbose Enable verbose logging
# Audit an agent on Ethereum mainnet node scripts/audit.js 0x742d35Cc6634C0532925a3b844Bc9e7595f8bE21 # Audit with custom RPC node scripts/audit.js 0x742d35Cc6634C0532925a3b844Bc9e7595f8bE21 --rpc https://mainnet.infura.io/v3/YOUR_KEY # Save report to file node scripts/audit.js 0x742d35Cc6634C0532925a3b844Bc9e7595f8bE21 --output report.json
Missing or empty metadata (no name, description) No registered services/endpoints Invalid or unreachable agent URI No agent wallet configured
Unverified endpoints (no domain control proof) Suspicious endpoint patterns (localhost, IP addresses, unusual ports) No x402 payment support warning No reputation signals
No validation registrations Missing supportedTrust indicators Inactive agent status
Reputation score summary Validation count Service endpoint count
agent-security-auditor/ βββ SKILL.md # This file βββ scripts/ β βββ audit.js # Main audit logic βββ references/ βββ ERC-8004.md # ERC-8004 specification reference
ethers.js ^6.x - Ethereum blockchain interaction node-fetch or built-in fetch - HTTP requests for off-chain metadata
0 - Audit completed successfully 1 - Invalid agent address 2 - Blockchain connection error 3 - Critical error during audit
Requires internet connection for RPC calls and metadata fetching Some checks require off-chain metadata fetching which may be slow Reputation and validation registries are optional deployments
Trading, swaps, payments, treasury, liquidity, and crypto-financial operations.
Largest current source with strong distribution and engagement signals.