{
  "schemaVersion": "1.0",
  "item": {
    "slug": "erc8128",
    "name": "ERC-8128",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/jacopo-eth/erc8128",
    "canonicalUrl": "https://clawhub.ai/jacopo-eth/erc8128",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/erc8128",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=erc8128",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md",
      "references/cli.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/erc8128"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/erc8128",
    "agentPageUrl": "https://openagent3.xyz/skills/erc8128/agent",
    "manifestUrl": "https://openagent3.xyz/skills/erc8128/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/erc8128/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "ERC-8128: Ethereum HTTP Signatures",
        "body": "ERC-8128 extends RFC 9421 (HTTP Message Signatures) with Ethereum wallet signing. It enables HTTP authentication using existing Ethereum keys—no new credentials needed.\n\n📚 Full documentation: erc8128.slice.so"
      },
      {
        "title": "When to Use",
        "body": "API authentication — Wallets already onchain can authenticate to your backend\nAgent auth — Bots and agents sign requests with their operational keys\nReplay protection — Signatures include nonces and expiration\nRequest integrity — Sign URL, method, headers, and body"
      },
      {
        "title": "Packages",
        "body": "PackagePurpose@slicekit/erc8128JS library for signing and verifying@slicekit/erc8128-cliCLI for signed requests (erc8128 curl)"
      },
      {
        "title": "Sign requests",
        "body": "import { createSignerClient } from '@slicekit/erc8128'\nimport type { EthHttpSigner } from '@slicekit/erc8128'\nimport { privateKeyToAccount } from 'viem/accounts'\n\nconst account = privateKeyToAccount('0x...')\n\nconst signer: EthHttpSigner = {\n  chainId: 1,\n  address: account.address,\n  signMessage: async (msg) => account.signMessage({ message: { raw: msg } }),\n}\n\nconst client = createSignerClient(signer)\n\n// Sign and send\nconst response = await client.fetch('https://api.example.com/orders', {\n  method: 'POST',\n  headers: { 'Content-Type': 'application/json' },\n  body: JSON.stringify({ amount: '100' }),\n})\n\n// Sign only (returns new Request with signature headers)\nconst signedRequest = await client.signRequest('https://api.example.com/orders')"
      },
      {
        "title": "Verify requests",
        "body": "import { createVerifierClient } from '@slicekit/erc8128'\nimport type { NonceStore } from '@slicekit/erc8128'\nimport { createPublicClient, http } from 'viem'\nimport { mainnet } from 'viem/chains'\n\n// NonceStore interface for replay protection\nconst nonceStore: NonceStore = {\n  consume: async (key: string, ttlSeconds: number): Promise<boolean> => {\n    // Return true if nonce was successfully consumed (first use)\n    // Return false if nonce was already used (replay attempt)\n  }\n}\n\nconst publicClient = createPublicClient({ chain: mainnet, transport: http() })\nconst verifier = createVerifierClient(publicClient.verifyMessage, nonceStore)\n\nconst result = await verifier.verifyRequest(request)\n\nif (result.ok) {\n  console.log(`Authenticated: ${result.address} on chain ${result.chainId}`)\n} else {\n  console.log(`Failed: ${result.reason}`)\n}"
      },
      {
        "title": "Sign options",
        "body": "OptionTypeDefaultDescriptionbinding\"request-bound\" | \"class-bound\"\"request-bound\"What to signreplay\"non-replayable\" | \"replayable\"\"non-replayable\"Include noncettlSecondsnumber60Signature validitycomponentsstring[]—Additional components to signcontentDigest\"auto\" | \"recompute\" | \"require\" | \"off\"\"auto\"Content-Digest handling\n\nrequest-bound: Signs @authority, @method, @path, @query (if present), and content-digest (if body present). Each request is unique.\n\nclass-bound: Signs only the components you explicitly specify. Reusable across similar requests. Requires components array.\n\n📖 See Request Binding for details."
      },
      {
        "title": "Verify policy",
        "body": "OptionTypeDefaultDescriptionmaxValiditySecnumber300Max allowed TTLclockSkewSecnumber0Allowed clock driftreplayablebooleanfalseAllow nonce-less signaturesclassBoundPoliciesstring[] | string[][]—Accepted class-bound component sets\n\n📖 See Verifying Requests and VerifyPolicy for full options."
      },
      {
        "title": "CLI: erc8128 curl",
        "body": "For CLI usage, see references/cli.md.\n\nQuick examples:\n\n# GET with keystore\nerc8128 curl --keystore ./key.json https://api.example.com/data\n\n# POST with JSON\nerc8128 curl -X POST \\\n  -H \"Content-Type: application/json\" \\\n  -d '{\"foo\":\"bar\"}' \\\n  --keyfile ~/.keys/bot.key \\\n  https://api.example.com/submit\n\n# Dry run (sign only)\nerc8128 curl --dry-run -d @body.json --keyfile ~/.keys/bot.key https://api.example.com\n\n📖 See CLI Guide for full documentation."
      },
      {
        "title": "Express middleware",
        "body": "import { verifyRequest } from '@slicekit/erc8128'\nimport type { NonceStore } from '@slicekit/erc8128'\nimport { createPublicClient, http } from 'viem'\nimport { mainnet } from 'viem/chains'\n\nconst publicClient = createPublicClient({ chain: mainnet, transport: http() })\n\n// Implement NonceStore (Redis example)\nconst nonceStore: NonceStore = {\n  consume: async (key, ttlSeconds) => {\n    const result = await redis.set(key, '1', 'EX', ttlSeconds, 'NX')\n    return result === 'OK'\n  }\n}\n\nasync function erc8128Auth(req, res, next) {\n  const result = await verifyRequest(\n    toFetchRequest(req), // Convert Express req to Fetch Request\n    publicClient.verifyMessage,\n    nonceStore\n  )\n\n  if (!result.ok) {\n    return res.status(401).json({ error: result.reason })\n  }\n\n  req.auth = { address: result.address, chainId: result.chainId }\n  next()\n}"
      },
      {
        "title": "Agent signing (with key file)",
        "body": "import { createSignerClient } from '@slicekit/erc8128'\nimport type { EthHttpSigner } from '@slicekit/erc8128'\nimport { privateKeyToAccount } from 'viem/accounts'\nimport { readFileSync } from 'fs'\n\nconst key = readFileSync(process.env.KEYFILE, 'utf8').trim()\nconst account = privateKeyToAccount(key as `0x${string}`)\n\nconst signer: EthHttpSigner = {\n  chainId: Number(process.env.CHAIN_ID) || 1,\n  address: account.address,\n  signMessage: async (msg) => account.signMessage({ message: { raw: msg } }),\n}\n\nconst client = createSignerClient(signer)\n\n// Use client.fetch() for all authenticated requests"
      },
      {
        "title": "Verify failure reasons",
        "body": "type VerifyFailReason =\n  | 'missing_headers'\n  | 'label_not_found'\n  | 'bad_signature_input'\n  | 'bad_signature'\n  | 'bad_keyid'\n  | 'bad_time'\n  | 'not_yet_valid'\n  | 'expired'\n  | 'validity_too_long'\n  | 'nonce_required'\n  | 'replayable_not_allowed'\n  | 'replayable_invalidation_required'\n  | 'replayable_not_before'\n  | 'replayable_invalidated'\n  | 'class_bound_not_allowed'\n  | 'not_request_bound'\n  | 'nonce_window_too_long'\n  | 'replay'\n  | 'digest_mismatch'\n  | 'digest_required'\n  | 'alg_not_allowed'\n  | 'bad_signature_bytes'\n  | 'bad_signature_check'\n\n📖 See VerifyFailReason for descriptions."
      },
      {
        "title": "Key Management",
        "body": "For agents and automated systems:\n\nMethodSecurityUse Case--keyfileMediumUnencrypted key file, file permissions for protection--keystoreHighEncrypted JSON keystore, password requiredETH_PRIVATE_KEYLowEnvironment variable, avoid in productionSigning serviceHighDelegate to external service (SIWA, AWAL)"
      },
      {
        "title": "Documentation",
        "body": "Full docs: erc8128.slice.so\nQuick Start: erc8128.slice.so/getting-started/quick-start\nConcepts: erc8128.slice.so/concepts/overview\nAPI Reference: erc8128.slice.so/api/signRequest\nERC-8128 Spec: GitHub"
      }
    ],
    "body": "ERC-8128: Ethereum HTTP Signatures\n\nERC-8128 extends RFC 9421 (HTTP Message Signatures) with Ethereum wallet signing. It enables HTTP authentication using existing Ethereum keys—no new credentials needed.\n\n📚 Full documentation: erc8128.slice.so\n\nWhen to Use\nAPI authentication — Wallets already onchain can authenticate to your backend\nAgent auth — Bots and agents sign requests with their operational keys\nReplay protection — Signatures include nonces and expiration\nRequest integrity — Sign URL, method, headers, and body\nPackages\nPackage\tPurpose\n@slicekit/erc8128\tJS library for signing and verifying\n@slicekit/erc8128-cli\tCLI for signed requests (erc8128 curl)\nLibrary: @slicekit/erc8128\nSign requests\nimport { createSignerClient } from '@slicekit/erc8128'\nimport type { EthHttpSigner } from '@slicekit/erc8128'\nimport { privateKeyToAccount } from 'viem/accounts'\n\nconst account = privateKeyToAccount('0x...')\n\nconst signer: EthHttpSigner = {\n  chainId: 1,\n  address: account.address,\n  signMessage: async (msg) => account.signMessage({ message: { raw: msg } }),\n}\n\nconst client = createSignerClient(signer)\n\n// Sign and send\nconst response = await client.fetch('https://api.example.com/orders', {\n  method: 'POST',\n  headers: { 'Content-Type': 'application/json' },\n  body: JSON.stringify({ amount: '100' }),\n})\n\n// Sign only (returns new Request with signature headers)\nconst signedRequest = await client.signRequest('https://api.example.com/orders')\n\nVerify requests\nimport { createVerifierClient } from '@slicekit/erc8128'\nimport type { NonceStore } from '@slicekit/erc8128'\nimport { createPublicClient, http } from 'viem'\nimport { mainnet } from 'viem/chains'\n\n// NonceStore interface for replay protection\nconst nonceStore: NonceStore = {\n  consume: async (key: string, ttlSeconds: number): Promise<boolean> => {\n    // Return true if nonce was successfully consumed (first use)\n    // Return false if nonce was already used (replay attempt)\n  }\n}\n\nconst publicClient = createPublicClient({ chain: mainnet, transport: http() })\nconst verifier = createVerifierClient(publicClient.verifyMessage, nonceStore)\n\nconst result = await verifier.verifyRequest(request)\n\nif (result.ok) {\n  console.log(`Authenticated: ${result.address} on chain ${result.chainId}`)\n} else {\n  console.log(`Failed: ${result.reason}`)\n}\n\nSign options\nOption\tType\tDefault\tDescription\nbinding\t\"request-bound\" | \"class-bound\"\t\"request-bound\"\tWhat to sign\nreplay\t\"non-replayable\" | \"replayable\"\t\"non-replayable\"\tInclude nonce\nttlSeconds\tnumber\t60\tSignature validity\ncomponents\tstring[]\t—\tAdditional components to sign\ncontentDigest\t\"auto\" | \"recompute\" | \"require\" | \"off\"\t\"auto\"\tContent-Digest handling\n\nrequest-bound: Signs @authority, @method, @path, @query (if present), and content-digest (if body present). Each request is unique.\n\nclass-bound: Signs only the components you explicitly specify. Reusable across similar requests. Requires components array.\n\n📖 See Request Binding for details.\n\nVerify policy\nOption\tType\tDefault\tDescription\nmaxValiditySec\tnumber\t300\tMax allowed TTL\nclockSkewSec\tnumber\t0\tAllowed clock drift\nreplayable\tboolean\tfalse\tAllow nonce-less signatures\nclassBoundPolicies\tstring[] | string[][]\t—\tAccepted class-bound component sets\n\n📖 See Verifying Requests and VerifyPolicy for full options.\n\nCLI: erc8128 curl\n\nFor CLI usage, see references/cli.md.\n\nQuick examples:\n\n# GET with keystore\nerc8128 curl --keystore ./key.json https://api.example.com/data\n\n# POST with JSON\nerc8128 curl -X POST \\\n  -H \"Content-Type: application/json\" \\\n  -d '{\"foo\":\"bar\"}' \\\n  --keyfile ~/.keys/bot.key \\\n  https://api.example.com/submit\n\n# Dry run (sign only)\nerc8128 curl --dry-run -d @body.json --keyfile ~/.keys/bot.key https://api.example.com\n\n\n📖 See CLI Guide for full documentation.\n\nCommon Patterns\nExpress middleware\nimport { verifyRequest } from '@slicekit/erc8128'\nimport type { NonceStore } from '@slicekit/erc8128'\nimport { createPublicClient, http } from 'viem'\nimport { mainnet } from 'viem/chains'\n\nconst publicClient = createPublicClient({ chain: mainnet, transport: http() })\n\n// Implement NonceStore (Redis example)\nconst nonceStore: NonceStore = {\n  consume: async (key, ttlSeconds) => {\n    const result = await redis.set(key, '1', 'EX', ttlSeconds, 'NX')\n    return result === 'OK'\n  }\n}\n\nasync function erc8128Auth(req, res, next) {\n  const result = await verifyRequest(\n    toFetchRequest(req), // Convert Express req to Fetch Request\n    publicClient.verifyMessage,\n    nonceStore\n  )\n\n  if (!result.ok) {\n    return res.status(401).json({ error: result.reason })\n  }\n\n  req.auth = { address: result.address, chainId: result.chainId }\n  next()\n}\n\nAgent signing (with key file)\nimport { createSignerClient } from '@slicekit/erc8128'\nimport type { EthHttpSigner } from '@slicekit/erc8128'\nimport { privateKeyToAccount } from 'viem/accounts'\nimport { readFileSync } from 'fs'\n\nconst key = readFileSync(process.env.KEYFILE, 'utf8').trim()\nconst account = privateKeyToAccount(key as `0x${string}`)\n\nconst signer: EthHttpSigner = {\n  chainId: Number(process.env.CHAIN_ID) || 1,\n  address: account.address,\n  signMessage: async (msg) => account.signMessage({ message: { raw: msg } }),\n}\n\nconst client = createSignerClient(signer)\n\n// Use client.fetch() for all authenticated requests\n\nVerify failure reasons\ntype VerifyFailReason =\n  | 'missing_headers'\n  | 'label_not_found'\n  | 'bad_signature_input'\n  | 'bad_signature'\n  | 'bad_keyid'\n  | 'bad_time'\n  | 'not_yet_valid'\n  | 'expired'\n  | 'validity_too_long'\n  | 'nonce_required'\n  | 'replayable_not_allowed'\n  | 'replayable_invalidation_required'\n  | 'replayable_not_before'\n  | 'replayable_invalidated'\n  | 'class_bound_not_allowed'\n  | 'not_request_bound'\n  | 'nonce_window_too_long'\n  | 'replay'\n  | 'digest_mismatch'\n  | 'digest_required'\n  | 'alg_not_allowed'\n  | 'bad_signature_bytes'\n  | 'bad_signature_check'\n\n\n📖 See VerifyFailReason for descriptions.\n\nKey Management\n\nFor agents and automated systems:\n\nMethod\tSecurity\tUse Case\n--keyfile\tMedium\tUnencrypted key file, file permissions for protection\n--keystore\tHigh\tEncrypted JSON keystore, password required\nETH_PRIVATE_KEY\tLow\tEnvironment variable, avoid in production\nSigning service\tHigh\tDelegate to external service (SIWA, AWAL)\nDocumentation\nFull docs: erc8128.slice.so\nQuick Start: erc8128.slice.so/getting-started/quick-start\nConcepts: erc8128.slice.so/concepts/overview\nAPI Reference: erc8128.slice.so/api/signRequest\nERC-8128 Spec: GitHub"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/jacopo-eth/erc8128",
    "publisherUrl": "https://clawhub.ai/jacopo-eth/erc8128",
    "owner": "jacopo-eth",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/erc8128",
    "downloadUrl": "https://openagent3.xyz/downloads/erc8128",
    "agentUrl": "https://openagent3.xyz/skills/erc8128/agent",
    "manifestUrl": "https://openagent3.xyz/skills/erc8128/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/erc8128/agent.md"
  }
}