Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Perform AMD SEV-SNP remote attestation to cryptographically verify VM identity and integrity. Use when proving a VM is running in a genuine AMD SEV-SNP confidential computing environment, verifying VM integrity before trusting it with secrets, checking SEV-SNP availability, generating attestation reports, validating AMD certificate chains (ARK/ASK/VCEK), or debugging attestation failures.
Perform AMD SEV-SNP remote attestation to cryptographically verify VM identity and integrity. Use when proving a VM is running in a genuine AMD SEV-SNP confidential computing environment, verifying VM integrity before trusting it with secrets, checking SEV-SNP availability, generating attestation reports, validating AMD certificate chains (ARK/ASK/VCEK), or debugging attestation failures.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
AMD SEV-SNP remote attestation for cryptographic VM identity verification.
Perform AMD SEV-SNP (Secure Encrypted Virtualization - Secure Nested Paging) remote attestation to cryptographically verify VM identity and integrity. Use this skill when: Proving a VM is running in a genuine AMD SEV-SNP confidential computing environment Verifying the integrity of a confidential VM before trusting it with secrets Checking if SEV-SNP is available and properly configured Generating attestation reports for remote verification Validating AMD certificate chains (ARK β ASK β VCEK) Debugging attestation failures or certificate issues Keywords: SEV-SNP, attestation, confidential computing, AMD, VCEK, certificate chain, remote attestation, VM identity, TCB, measurement
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ β SEV-SNP Attestation Flow β βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ β βΌ βββββββββββββββββββ β 1. Detection β β Is SEV-SNP β β available? β ββββββββββ¬βββββββββ β ββββββββββββββββ΄βββββββββββββββ β β βΌ βΌ βββββββββββ βββββββββββ β YES β β NO β ββββββ¬βββββ ββββββ¬βββββ β β βΌ βΌ βββββββββββββββββββ βββββββββββββββββββ β 2. Generate β β Exit with β β Report β β helpful error β ββββββββββ¬βββββββββ βββββββββββββββββββ β βΌ βββββββββββββββββββ β 3. Display β β Report Info β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β 4. Fetch AMD β β Certificates β β (ARK, ASK, VCEK)β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β 5. Verify β β Cert Chain β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β 6. Verify β β Report Sig β ββββββββββ¬βββββββββ β βΌ βββββββββββββββββββ β PASSED or β β FAILED β βββββββββββββββββββ
./scripts/detect-sev-snp.sh
./scripts/full-attestation.sh [output_dir] This runs the complete 6-step attestation workflow and outputs PASSED or FAILED.
Each step can be run independently for debugging or custom workflows: ScriptPurposescripts/detect-sev-snp.shCheck SEV-SNP availabilityscripts/generate-report.sh <output_dir>Generate attestation report with noncescripts/fetch-certificates.sh <report_file> <output_dir>Fetch AMD certificates from KDSscripts/verify-chain.sh <certs_dir>Verify certificate chainscripts/verify-report.sh <report_file> <certs_dir>Verify report signature
snpguest: Rust CLI from virtee/snpguest openssl: For certificate operations curl: For fetching certificates from AMD KDS Root access: Required to access /dev/sev-guest Install snpguest: cargo install snpguest
Report Fields - Attestation report field reference Error Codes - Common errors and troubleshooting Manual Verification - OpenSSL-based verification without snpguest
AMD KDS URL: https://kdsintf.amd.com Certificate Chain: ARK (self-signed) β ASK β VCEK Report Signature: ECDSA P-384 Device: /dev/sev-guest (requires root or sev group membership)
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.