Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Sign and verify HTTP requests with Ethereum wallets using ERC-8128. Use when building authenticated APIs that need wallet-based auth, making signed requests...
Sign and verify HTTP requests with Ethereum wallets using ERC-8128. Use when building authenticated APIs that need wallet-based auth, making signed requests...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
ERC-8128 extends RFC 9421 (HTTP Message Signatures) with Ethereum wallet signing. It enables HTTP authentication using existing Ethereum keysβno new credentials needed. π Full documentation: erc8128.slice.so
API authentication β Wallets already onchain can authenticate to your backend Agent auth β Bots and agents sign requests with their operational keys Replay protection β Signatures include nonces and expiration Request integrity β Sign URL, method, headers, and body
PackagePurpose@slicekit/erc8128JS library for signing and verifying@slicekit/erc8128-cliCLI for signed requests (erc8128 curl)
import { createSignerClient } from '@slicekit/erc8128' import type { EthHttpSigner } from '@slicekit/erc8128' import { privateKeyToAccount } from 'viem/accounts' const account = privateKeyToAccount('0x...') const signer: EthHttpSigner = { chainId: 1, address: account.address, signMessage: async (msg) => account.signMessage({ message: { raw: msg } }), } const client = createSignerClient(signer) // Sign and send const response = await client.fetch('https://api.example.com/orders', { method: 'POST', headers: { 'Content-Type': 'application/json' }, body: JSON.stringify({ amount: '100' }), }) // Sign only (returns new Request with signature headers) const signedRequest = await client.signRequest('https://api.example.com/orders')
import { createVerifierClient } from '@slicekit/erc8128' import type { NonceStore } from '@slicekit/erc8128' import { createPublicClient, http } from 'viem' import { mainnet } from 'viem/chains' // NonceStore interface for replay protection const nonceStore: NonceStore = { consume: async (key: string, ttlSeconds: number): Promise<boolean> => { // Return true if nonce was successfully consumed (first use) // Return false if nonce was already used (replay attempt) } } const publicClient = createPublicClient({ chain: mainnet, transport: http() }) const verifier = createVerifierClient(publicClient.verifyMessage, nonceStore) const result = await verifier.verifyRequest(request) if (result.ok) { console.log(`Authenticated: ${result.address} on chain ${result.chainId}`) } else { console.log(`Failed: ${result.reason}`) }
OptionTypeDefaultDescriptionbinding"request-bound" | "class-bound""request-bound"What to signreplay"non-replayable" | "replayable""non-replayable"Include noncettlSecondsnumber60Signature validitycomponentsstring[]βAdditional components to signcontentDigest"auto" | "recompute" | "require" | "off""auto"Content-Digest handling request-bound: Signs @authority, @method, @path, @query (if present), and content-digest (if body present). Each request is unique. class-bound: Signs only the components you explicitly specify. Reusable across similar requests. Requires components array. π See Request Binding for details.
OptionTypeDefaultDescriptionmaxValiditySecnumber300Max allowed TTLclockSkewSecnumber0Allowed clock driftreplayablebooleanfalseAllow nonce-less signaturesclassBoundPoliciesstring[] | string[][]βAccepted class-bound component sets π See Verifying Requests and VerifyPolicy for full options.
For CLI usage, see references/cli.md. Quick examples: # GET with keystore erc8128 curl --keystore ./key.json https://api.example.com/data # POST with JSON erc8128 curl -X POST \ -H "Content-Type: application/json" \ -d '{"foo":"bar"}' \ --keyfile ~/.keys/bot.key \ https://api.example.com/submit # Dry run (sign only) erc8128 curl --dry-run -d @body.json --keyfile ~/.keys/bot.key https://api.example.com π See CLI Guide for full documentation.
import { verifyRequest } from '@slicekit/erc8128' import type { NonceStore } from '@slicekit/erc8128' import { createPublicClient, http } from 'viem' import { mainnet } from 'viem/chains' const publicClient = createPublicClient({ chain: mainnet, transport: http() }) // Implement NonceStore (Redis example) const nonceStore: NonceStore = { consume: async (key, ttlSeconds) => { const result = await redis.set(key, '1', 'EX', ttlSeconds, 'NX') return result === 'OK' } } async function erc8128Auth(req, res, next) { const result = await verifyRequest( toFetchRequest(req), // Convert Express req to Fetch Request publicClient.verifyMessage, nonceStore ) if (!result.ok) { return res.status(401).json({ error: result.reason }) } req.auth = { address: result.address, chainId: result.chainId } next() }
import { createSignerClient } from '@slicekit/erc8128' import type { EthHttpSigner } from '@slicekit/erc8128' import { privateKeyToAccount } from 'viem/accounts' import { readFileSync } from 'fs' const key = readFileSync(process.env.KEYFILE, 'utf8').trim() const account = privateKeyToAccount(key as `0x${string}`) const signer: EthHttpSigner = { chainId: Number(process.env.CHAIN_ID) || 1, address: account.address, signMessage: async (msg) => account.signMessage({ message: { raw: msg } }), } const client = createSignerClient(signer) // Use client.fetch() for all authenticated requests
type VerifyFailReason = | 'missing_headers' | 'label_not_found' | 'bad_signature_input' | 'bad_signature' | 'bad_keyid' | 'bad_time' | 'not_yet_valid' | 'expired' | 'validity_too_long' | 'nonce_required' | 'replayable_not_allowed' | 'replayable_invalidation_required' | 'replayable_not_before' | 'replayable_invalidated' | 'class_bound_not_allowed' | 'not_request_bound' | 'nonce_window_too_long' | 'replay' | 'digest_mismatch' | 'digest_required' | 'alg_not_allowed' | 'bad_signature_bytes' | 'bad_signature_check' π See VerifyFailReason for descriptions.
For agents and automated systems: MethodSecurityUse Case--keyfileMediumUnencrypted key file, file permissions for protection--keystoreHighEncrypted JSON keystore, password requiredETH_PRIVATE_KEYLowEnvironment variable, avoid in productionSigning serviceHighDelegate to external service (SIWA, AWAL)
Full docs: erc8128.slice.so Quick Start: erc8128.slice.so/getting-started/quick-start Concepts: erc8128.slice.so/concepts/overview API Reference: erc8128.slice.so/api/signRequest ERC-8128 Spec: GitHub
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.