A decentralized identity management toolkit for AI agents using iden3 protocol on Billions Network.
This skill enables AI agents to create, manage, link, prove and verify ownership of decentralized identities (DIDs) using cryptographic signatures.
-
Ask bot to install the skill:
Install the skill `npx clawhub@latest install verified-agent-identity`Or
Install the `verified-agent-identity` skill from the OpenClaw clawhub.ai. -
(Optional) If the verification process did not start automatically after installation, ask your bot to initialize the process by sending a message like:
Please link your agent identity to me.
-
Install the skill:
npx clawhub@latest install verified-agent-identity
-
Create a new identity:
# Generate a new key and create a new identity node scripts/createNewEthereumIdentity.jsOr
# Use an existing private key to create an identity node scripts/createNewEthereumIdentity.js --key <your-ethereum-private-key>
-
Generate a verification link to connect your human identity to the agent:
node scripts/manualLinkHumanToAgent.js --challenge '{"name": "Agent Name", "description": "Short description of the agent"}'This prints the verification URL to the console. Open it in your browser to complete the identity linking process.
- Identity Creation: Generate new DIDs with random or existing Ethereum private keys
- Identity Management: List and manage multiple identities with default identity support
- Human-Agent Linking: Link a human identity to an agent's DID through signed challenges
- Proof Generation: Generate cryptographic proofs to authenticate as a specific identity
- Proof Verification: Verify proofs to confirm identity ownership
- Node.js
>= v20and npm are required to run the scripts. - The
openclawCLI must be installed and available inPATH. It is a hard runtime dependency used exclusively for sending direct messages to other agents or users on the Billions Network.
npm dependencies are intentionally minimal and scoped to well-established, audited packages:
| Package | Purpose |
|---|---|
@0xpolygonid/js-sdk |
iden3/Polygon ID cryptographic primitives and key management |
@iden3/js-iden3-core |
DID and identity core types |
@iden3/js-iden3-auth |
JWS/JWA authorization response construction and verification |
ethers |
Ethereum key utilities |
shell-quote |
Shell token parsing used only for input sanitization |
uuid |
UUID generation for protocol message IDs |
All cryptographic material is persisted to $HOME/.openclaw/billions/ — a directory that lives outside the agent's workspace:
| File | Contents |
|---|---|
kms.json |
Private keys (unencrypted, owner-readable only) |
identities.json |
Identity metadata |
defaultDid.json |
Active DID and associated public key |
challenges.json |
Per-DID challenge history |
credentials.json |
Verifiable credentials |
Only one specific command is ever executed: openclaw message send, with a fixed, hardcoded argument structure. The binary name, the subcommand, and all flag names (--target, --message) are hardcoded. User-supplied values are only ever passed as the values of those flags, never as the command name, subcommand, or flag names. Nothing else can be executed. There is no mechanism to change the binary, add flags, or inject subcommands. Additional security properties:
- No shell interpolation:
execFileSync(binary, argsArray)bypasses the OS shell entirely. The OSexec*syscall receives the argument vector directly — shell metacharacters in argument values are treated as literal data. - Argument-level input validation: Before the call, all user-supplied values pass through two independent validation layers:
validateTarget— enforces a strict allowlist regex (/^[A-Za-z0-9:._@\-\/]+$/) on the--targetvalue.assertNoShellOperators— usesshell-quoteto tokenize the input and rejects any token with anopproperty (i.e.,|,&,;,>,<,$(), etc.).
- No dynamic code execution: No
eval,new Function,child_process.exec, or shell-interpolatedexecSynccalls exist anywhere in the codebase.
Prompt injection and arbitrary code execution are structurally impossible: the executed command and its flags are hardcoded constants, and user data can only influence the string values passed to --target and --message after sanitization.
- All external http calls will be made to trusted resources.
- No external binary other than
openclawis invoked. - Any external URLs or verification links produced by the scripts are delivered to the user as a plain text message via
openclaw message send. The agent has no ability to follow, fetch, open, or interact with those URLs in any way - it only forwards the string to the user.
See SKILL.md for detailed usage instructions and examples.