← All skills
Tencent SkillHub Β· Developer Tools

Vouch

Signs, verifies, and manages cryptographic identity for AI agents using the Vouch CLI on Base. Use when an agent needs to: set up identity and register an ac...

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Signs, verifies, and manages cryptographic identity for AI agents using the Vouch CLI on Base. Use when an agent needs to: set up identity and register an ac...

⬇ 0 downloads β˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
config.json, README.md, SKILL.md, examples/sign-output.json, examples/send-output.json, examples/account-usage.json

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.1

Documentation

ClawHub primary doc Primary doc: SKILL.md 30 sections Open source page

Vouch CLI

Vouch provides verifiable identity for AI agents on Base. Agents create an identity wallet, connect a social account (X or GitHub) to create their API account, optionally link additional identities (including DNS), and delegate short-lived runtime keys. Messages are signed as EIP-712 envelopes and verified against the VouchHub smart contract via direct RPC reads. Account (OAuth + API key) ──manages──> Wallet (identity) β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€ β–Ό β–Ό Linked Identities Runtime Key (delegated, scoped) (X, GitHub, DNS) β”‚ └──sign──> Envelope (EIP-712) β”‚ Recipient ──verify──> VouchHub (RPC) β”‚ βœ“ signer β†’ wallet β†’ linked identities

Install

curl -fsSL https://vouch.directory/install.sh | bash Verify: vouch --version

Global flags

--json β€” JSON output (auto-enabled when piped) --config <path> β€” Config file (default ~/.vouch/config.toml) --network <base-sepolia|base> β€” Network override

Full setup wizard

vouch init walks through complete onboarding: generate a wallet, connect a social account (X or GitHub) which creates your API account and links your identity, then delegate a runtime key. vouch init The init flow: Generate wallet β€” creates a new identity keypair stored locally at ~/.vouch/keys/ Save config β€” writes ~/.vouch/config.toml with network defaults Connect account β€” opens browser for X or GitHub OAuth, which creates your API account (provides API key) and links your identity on-chain Delegate runtime key β€” creates a 24-hour signing key for your agent Re-initialize an existing setup: vouch init --force This is the recommended first command. It handles everything needed to start signing and verifying messages.

Log in on a new machine

Set an existing API key: vouch login --api-key vk_... Flags: --api-key <vk_...> (required). Validates against the API before saving.

Link identities

Vouch supports three identity providers. Each links a social account or domain to your onchain wallet.

Link X (Twitter)

Interactive mode opens the browser for OAuth: vouch link-x Pipe mode for scripting: vouch --json link-x --wallet-key 0xKEY --attestation '{"provider":1,...}' Flags: --wallet-key <hex>, --attestation <json>

Link GitHub

vouch link-github Pipe mode: vouch --json link-github --wallet-key 0xKEY --attestation '{"provider":2,...}' Flags: --wallet-key <hex>, --attestation <json>

Link a domain via DNS

Link a domain to your wallet. Requires an existing API account (created via vouch init), since DNS alone cannot verify user identity for account creation. Interactive mode requests a DNS challenge, shows the TXT record to add, then verifies: vouch link-dns Pipe mode: vouch --json link-dns --wallet-key 0xKEY --domain example.com Flags: --wallet-key <hex>, --domain <domain>

Revoke a linked identity

vouch --json revoke-link --wallet-key 0xKEY --provider x Flags: --wallet-key <hex> (required), --provider <x|github|dns> (required)

Sign outbound messages

Wrap any JSON payload in a signed EIP-712 envelope: vouch --json sign --payload '{"msg":"hello from agent"}' Pipe payload via stdin: echo '{"task":"summarize","doc_id":"abc"}' | vouch --json sign With explicit runtime key and custom expiry: vouch --json sign --key 0xRUNTIME_KEY --payload '{"msg":"hello"}' --expiry 1h Output: { "envelope": { "v": 1, "agent_id": "0x...", "signer": "0x...", "ts": 1760000000, "exp": 1760003600, "nonce": "0xa1b2c3d4e5f6", "payload_hash": "0x...", "sig": "0x..." }, "payload": {"msg": "hello from agent"} } Flags: --payload '<json>' (or stdin), --key <address>, --scope <text>, --expiry <duration>

Verify inbound messages

Checks signature, expiry, nonce replay, payload hash, delegation status, and allowlist: echo "$SIGNED_JSON" | vouch --json verify From explicit JSON: vouch --json verify --envelope '{"envelope":{...},"payload":{...}}' From a remote endpoint: vouch --json verify --url https://agent.example.com/latest-signed Output: { "valid": true, "signer": "0x...", "identities": [ {"provider": 1, "provider_label": "alice"}, {"provider": 2, "provider_label": "alice-gh"} ], "scope": "messaging", "scope_matched": true, "failure_reason": "", "allowlist_checked": false, "allowlist_skipped": false, "checked_at": "2026-02-23T12:00:00Z" } The failure_reason field explains why verification failed when valid is false. The identities array lists all linked identities for the signer. Flags: --envelope '<json>', --url <endpoint>, --skip-allowlist

Send verified messages

Sign a payload and POST it to another agent's endpoint: vouch --json send --payload '{"task":"summarize","doc_id":"abc"}' --url https://agent.example.com/vouch Resolve the endpoint from the onchain directory by wallet: vouch --json send --payload '{"task":"deploy"}' --wallet 0xTARGET_WALLET Pipe payload via stdin: echo '{"task":"analyze"}' | vouch --json send --url https://agent.example.com/vouch Output: { "endpoint": "https://agent.example.com/vouch", "accepted": true, "message": "task received", "error": "" } Flags: --payload '<json>' (or stdin), --url <endpoint> or --wallet <address> (mutually exclusive), --key <address>, --scope <text>, --expiry <duration> (default 1h)

Receive verified messages

Run an HTTP server that accepts, verifies, and processes signed envelopes: vouch receive --port 8080 --handler ./process.sh With allowlist enforcement and rate limiting: vouch receive --port 8080 --handler ./process.sh --allowlist --rate-limit 10 The server listens on /vouch and / (POST only). Each incoming message is verified cryptographically before being passed to the handler. Handler input (JSON on stdin): { "sender": { "agent_id": "0x...", "signer": "0x...", "identities": [ {"provider": 1, "provider_label": "alice"} ] }, "payload": {"task": "summarize", "doc_id": "abc"}, "verified_at": "2026-02-23T12:00:00Z" } The handler's stdout becomes the response message. If no handler is provided, verified messages are printed to stdout as newline-delimited JSON. Response format: {"accepted": true, "message": "task received"} Flags: --port <int> (default 8080), --handler <script>, --allowlist, --rate-limit <float> (requests/sec/IP, default 0 = unlimited)

Agent scaffolding

Create, run, and deploy OpenAI-powered agents that communicate using Vouch envelopes.

Create an agent

Interactive wizard that generates a ready-to-deploy agent project: vouch agent create Prompts for: agent name, description, language (Node.js or Python), model, OpenAI API key, and port. Creates the project at ~/.vouch/agents/<name>/.

Run locally

vouch agent start my-agent Starts vouch receive with the agent's handler and port. The agent listens for verified messages and processes them with the configured OpenAI model.

Deploy to Vercel

vouch agent deploy my-agent --prod Requires the Vercel CLI (npm i -g vercel). Deploys the agent and prints the live endpoint URL. Use --prod for production (default is preview). After deploying, publish the endpoint to the directory: vouch publish --wallet-key 0xKEY --endpoint https://my-agent.vercel.app/api/vouch --capabilities "chat,summarize"

Look up identities and agents

vouch --json lookup @alice # by X handle vouch --json lookup --wallet 0x... # by wallet address vouch --json lookup --xid 123 # by X user ID vouch --json lookup --key 0xRUNTIME_KEY # find who delegated a key vouch --json lookup --capability chat # search agent directory Output: { "mode": "handle", "query": "@alice", "found": true, "profile": { "wallet": "0x...", "identities": [ {"provider": 1, "provider_label": "alice", "revoked": false}, {"provider": 2, "provider_label": "alice-gh", "revoked": false} ] }, "delegations": [ { "runtime_key": "0x...", "expires_at": "1760086400", "scope": "messaging" } ], "agents": [ { "endpoint": "https://agent.example.com/api", "capabilities": ["chat", "verify", "summarize"] } ] }

Check current identity

vouch --json whoami # full identity summary (network call) vouch status # local config only (no network)

Manage delegations

Create a new runtime key delegation: vouch --json delegate --wallet-key 0xKEY --expiry 24h --scope messaging Renew an existing delegation with the same settings: vouch --json delegate --wallet-key 0xKEY --renew Output: { "runtime_key": "0x...", "expires_at": 1760003600, "scope": "messaging", "tx_hash": "0xdef..." } Constraints: max 30-day expiry, max 5 delegations per minute. Revoke a specific key: vouch --json revoke-key --wallet-key 0xKEY --key 0xRUNTIME_KEY Flags: --key <address|hex>, --expiry <duration> (default 24h), --scope <text>, --wallet-key <hex>, --renew

Publish agent capabilities

Register an endpoint and capabilities in the onchain agent directory: vouch --json publish \ --wallet-key 0xKEY \ --endpoint https://agent.example.com/api \ --capabilities "chat,verify,summarize"

Manage trust allowlist

When the allowlist has entries, vouch verify and vouch receive --allowlist only accept messages from listed agents. vouch allowlist add 0xWALLET @alice --note "trusted partner" vouch allowlist list vouch allowlist remove @alice

Check usage

vouch --json account Output: { "period": "2026-02", "relay_transactions": 3, "relay_limit": 10, "tier": "free" }

List API keys

vouch --json account keys

Check billing status

vouch --json account billing

Tier reference

FreePaid (usage-based)Verify callsUnlimitedFreeRelay transactions10/month$0.05 each Manage billing at https://vouch.directory/dashboard/billing or upgrade via the dashboard.

Recipes

Full onboarding for a new agent: vouch init Sign-then-verify round trip: vouch --json sign --payload '{"action":"deploy"}' \ | vouch --json verify \ | jq '{valid, signer, identities}' Send a verified message to another agent: vouch --json send --payload '{"task":"summarize","doc_id":"abc"}' --url https://agent.example.com/vouch Agent-to-agent round trip: # Terminal 1: start receiver vouch receive --port 9090 --handler ./echo.sh # Terminal 2: send verified message vouch --json send --payload '{"msg":"hello"}' --url http://localhost:9090/vouch Scaffold, test, and deploy an agent: vouch agent create vouch agent start my-agent # test locally, then deploy: vouch agent deploy my-agent --prod vouch publish --wallet-key 0xKEY --endpoint https://my-agent.vercel.app/api/vouch --capabilities "chat,summarize" Start a receiver with allowlist and rate limiting: vouch receive --port 8080 --handler ./process.sh --allowlist --rate-limit 10 Batch verify from file: while IFS= read -r line; do echo "$line" | vouch --json verify | jq -c '{valid, signer}' done < envelopes.jsonl Check usage before heavy operations: vouch --json account | jq '{relay_transactions, relay_limit, tier}' Find agents by capability: vouch --json lookup --capability chat | jq '.agents[]' Link an additional identity after setup: vouch link-github Sign, send, and verify in a pipeline: SIGNED=$(vouch --json sign --payload '{"task":"deploy","id":"cr-42"}') echo "$SIGNED" | curl -s -X POST -H "Content-Type: application/json" -d @- https://recipient.example.com/inbox

Reset

Teardown the current identity and reinitialize from scratch: vouch reset Interactive mode revokes onchain identity, deletes ~/.vouch/, then runs the full init flow (requires browser for OAuth). Requires typing RESET to confirm. Skip onchain revocation: vouch reset --force Pipe mode (teardown only β€” reinit requires browser): vouch --json reset --wallet-key 0xKEY Flags: --wallet-key <hex> (enables pipe mode, teardown only), --force (skip onchain revocation)

Teardown

Revoke onchain identity and delete all local state: vouch --json teardown --wallet-key 0xKEY Local-only cleanup (skip onchain revocation): vouch --json teardown --force

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
4 Config2 Docs
  • SKILL.md Primary doc
  • README.md Docs
  • config.json Config
  • examples/account-usage.json Config
  • examples/send-output.json Config
  • examples/sign-output.json Config