风险评分

94/100 (Very Low)

OpenClaw: benign
VirusTotal: benign
StaticScan: unknown

sev-attestation

作者: xinyuwang
Slug:sev-attestation
版本:1.0.2
更新时间:2026-02-26 05:50:39
风险信息

OpenClaw: benign

查看 OpenClaw 分析摘要(前 200 字预览)
The skill's code and instructions are coherent with its stated purpose (performing AMD SEV‑SNP attestation); it requires root/device access and network access to AMD's KDS but does not request unrelat...

[内容已截断]

VirusTotal: benign VT 报告

静态扫描: unknown

README

README 未提供

文件列表

无文件信息

下载
下载官方 ZIP
原始 JSON 数据
{
    "latestVersion": {
        "_creationTime": 1770018254373,
        "_id": "k97cvzxayf9n5zs16wm6w2s0nn80d4dq",
        "changelog": "sev-attestation 1.0.2\n\n- No user-facing or internal changes; version bump only.\n- All documentation, code, and workflow remain unchanged.",
        "changelogSource": "user",
        "createdAt": 1770018254373,
        "version": "1.0.2"
    },
    "owner": {
        "_creationTime": 0,
        "_id": "publishers:missing",
        "displayName": "xinyuwang",
        "handle": "xinyuwang",
        "image": "https:\/\/avatars.githubusercontent.com\/u\/6489045?v=4",
        "kind": "user",
        "linkedUserId": "kn74hnkbbmctzpa8b19hs0tc9h80bwbx"
    },
    "ownerHandle": "xinyuwang",
    "skill": {
        "_creationTime": 1769986039454,
        "_id": "kd75014h6qa7n6cx6z6s6j6n4x80bdsq",
        "badges": [],
        "createdAt": 1769986039454,
        "displayName": "sev-attestation",
        "latestVersionId": "k97cvzxayf9n5zs16wm6w2s0nn80d4dq",
        "ownerUserId": "kn74hnkbbmctzpa8b19hs0tc9h80bwbx",
        "slug": "sev-attestation",
        "stats": {
            "comments": 0,
            "downloads": 1630,
            "installsAllTime": 0,
            "installsCurrent": 0,
            "stars": 1,
            "versions": 3
        },
        "summary": "Perform AMD SEV-SNP remote attestation to cryptographically verify VM identity and integrity. Use when proving a VM is running in a genuine AMD SEV-SNP confidential computing environment, verifying VM integrity before trusting it with secrets, checking SEV-SNP availability, generating attestation reports, validating AMD certificate chains (ARK\/ASK\/VCEK), or debugging attestation failures.",
        "tags": {
            "latest": "k97cvzxayf9n5zs16wm6w2s0nn80d4dq"
        },
        "updatedAt": 1772056239556
    }
}