openclaw-ai-agent-verification
OpenClaw AI Agent Verification
Audit AI agent configurations for security risks via Cybercentry ACP. Returns Critical/High/Medium/Low risk level.
Workflow
- Install ACP CLI: npx skills add https://github.com/Virtual-Protocol/openclaw-acp --skill virtuals-protocol-acp
- Run
acp setup(one-time only) - Run
acp browse "Cybercentry"to find the provider wallet - Run
acp job create <wallet> openclaw-ai-agent-verification --requirements '{"tool": {...}, "config": {...}}' - Poll
acp job status <jobId>untilCOMPLETED
Requirements Schema
| Parameter | Type | Required | Description |
|---|---|---|---|
tool |
Object | No | Tool to validate (contains name and args) |
tool.name |
String | Yes | Tool name |
tool.args |
Object | Yes | Tool arguments |
config |
Object | Yes | Configuration (filename: openclaw.json or JSON content) |
skills |
String | No | Skills content (filename: SKILL.md or JSON content) |
message |
String | No | Message to validate |
sessionId |
String | No | Session identifier for tracking conversation context |
Deliverables
| Field | Type | Format | Description |
|---|---|---|---|
report |
String | Plain | Security risk report |
Gotchas
configis required - pass the openclaw.json content or an empty object{}tool.argsmust be an object, even if empty - use{}notnull- Large skills content should be stringified JSON, not raw markdown
More from cybercentry/cybercentry-agent-skills
cyber-security-consultant
Use this skill when you need security expertise: threat intelligence, vulnerability assessment, compliance guidance, incident response advice, or architecture reviews. Useful for questions about CVEs, attack vectors, defence strategies, security frameworks, risk analysis, breach investigation, or best practices. Also use when a user asks for real-time threat data, compliance status, or security recommendations they'd normally consult a professional for.
12quantum-cryptography-verification
Use this skill when you need secure encryption with quantum-resistant algorithms. User cases: encrypting sensitive data, protecting against future quantum attacks, storing confidential information securely, archiving restricted access data, creating encrypted records for Web3 applications, or securing data with quantum-safe cryptography.
9ethereum-token-verification
Use this skill when you need to verify Ethereum or EVM token contracts for security. User cases: checking token legitimacy, scanning for rug pulls, detecting hidden taxes, assessing liquidity risks, analysing holder distribution, evaluating tokens before purchase or investment, or gate-checking tokens in automated pipelines. Works with 44+ blockchain explorers across all major EVM networks.
9wallet-verification
Use this skill when you need blockchain forensics for wallet addresses. User cases: investigating wallet funding sources, screening sanctions compliance, detecting money laundering patterns, identifying bot automation, assessing wallet trustworthiness, evaluating counterparty risk, or gate-checking wallets in automated systems.
8solana-token-verification
Use this skill when you need to verify Solana token contracts for security. User cases: checking Solana token legitimacy, scanning for rug pulls, detecting hidden taxes, assessing liquidity risks, analysing holder distribution, evaluating tokens before investment, or gate-checking Solana tokens in automated pipelines.
7solidity-code-verification
Use this skill when you need security analysis of Solidity smart contract code. User cases: auditing Solidity contracts, identifying re-entrancy bugs, detecting access control issues, reviewing unsafe external calls, evaluating code before deployment, gate-checking contracts in transaction pipelines, or performing security assessments.
7