humanos

Require verifiable human approval before high-risk agent actions.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "humanos" with this command: npx skills add lagosrui/humanos-openclaw

Humanos - Programmable Human Authorization for Agent Actions

AI agents can execute actions. Humanos lets them prove human authorization before they do.

Require a mandate signature before high-risk execution.

What It Does

  • Collect human approval before sensitive agent actions
  • Issue machine-verifiable mandate signatures
  • Support scoped delegation (amount, duration, action type)
  • Enable revocation of previously granted authority

Humanos provides the authorization proof. Your runtime decides whether to execute.

When To Use It

Use Humanos when your agent can:

  • Move money or sign transactions
  • Initiate payouts, refunds, or batch payments
  • Modify or delete user data
  • Export or share sensitive data
  • Change account permissions or roles
  • Rotate API keys or security credentials
  • Update billing details or subscription plans
  • Execute contracts or legal agreements
  • Accept updated terms on behalf of a user
  • Grant third-party access to data
  • Release funds from escrow
  • Increase transaction or withdrawal limits
  • File claims, applications, or regulatory forms
  • Approve loan or credit changes
  • Post or publish under a user's identity
  • Control IoT or physical access devices
  • Act on behalf of a user
  • Delegate authority to another agent

If the action affects money, data, identity, ownership, or legal position, require a mandate signature.

How It Works

  1. Agent prepares a structured action
  2. Agent calls requestMandate(action, constraints)
  3. Human approves via SMS, email, wallet, API, or any programmable channel
  4. Humanos returns a signed mandate signature
  5. Agent verifies with verifyMandate(signature)
  6. Agent decides whether to execute

No valid mandate signature -> execution should not proceed.

Core API

requestMandate(action, constraints) -> mandate_signature verifyMandate(mandate_signature) -> true / false revokeMandate(mandate_signature)

Simple. Programmable. Deterministic.

VIA Humanos - Operational Instructions for Agents

Use this skill whenever the agent is about to do something that requires a human to say "yes" first. It sends a secure approval request to the right person - they receive a link, review the details, and approve or reject. The result comes back as a W3C Verifiable Credential with cryptographic proof that the action was authorized.

The agent should NEVER proceed with a sensitive action (payment, signing, data access, transfer) without first using this skill to get authorization.

When to use this skill

Use this skill when the user says things like:

  • "I need approval from [someone] before doing [something]"
  • "Get authorization from my manager for this payment"
  • "Send this contract/document to [someone] for signing"
  • "Check if [someone] approved the request"
  • "Has the mandate been approved or rejected?"
  • "Verify this person's identity before proceeding"
  • "Get consent from the user for data processing"
  • "Cancel the pending approval request"
  • "Look up user [email/phone/DID]"
  • "Is this mandate still valid?"

Also use this skill when the agent is about to:

  • Make a payment or transfer — get approval first
  • Sign or send a contract — collect digital signature
  • Access sensitive data — verify authorization exists
  • Execute a high-value action — check mandate constraints (amount limits, time bounds)
  • Start an onboarding flow — combine contract + form + consent in one request

Trigger keywords: approval, authorize, mandate, sign, consent, credential, KYC, identity verification, human approval, compliance, permission, delegation.

Prerequisites

  1. A VIA Protocol account with an API key from app.humanos.id
  2. Environment variables set:
    • VIA_API_KEY — Bearer token for API authentication
    • VIA_SIGNATURE_SECRET — HMAC secret for request signing
    • Optional: VIA_API_URL — Override API base URL (default: https://api.humanos.id)

Windows note: this skill is currently supported on macOS/Linux shells. On Windows, use WSL or Git Bash with bash, curl, jq, and openssl installed.

Authentication

All API requests require:

Authorization: Bearer $VIA_API_KEY
X-Timestamp: <unix-timestamp-ms>
X-Signature: <hmac-sha256 of (timestamp + "." + body) using VIA_SIGNATURE_SECRET>

Use the signing script: scripts/sign-request.sh

Official API documentation: https://humanos.mintlify.app/essentials/introduction

Operation Index (Fast Lookup)

Use this as the primary lookup table before reading detailed sections.

GoalScriptMethodEndpointRequired Args
Create approval requestscripts/create-request.shPOST/v1/request--contact, --type, --name
Check request statusscripts/get-request.shGET/v1/request/:id--id
Find requestsscripts/find-requests.shGET`/v1/request?contactdid
Get credential proofscripts/get-credential.shGET/v1/credential/:id--id
Get mandatescripts/get-mandate.shGET/v1/via/mandates/:id--id
Get mandate VCscripts/get-mandate-vc.shGET/v1/via/mandates/:id/vc--id
Resolve DIDscripts/resolve-did.shGET/v1/via/dids/:did--did
Look up userscripts/get-user.shGET`/v1/user?contactdid
Cancel requestscripts/cancel-request.shDELETE/v1/request/:id--id
Resend OTPscripts/resend-otp.shPATCH/v1/request/resend/:id--id (and optional --contact)

Create Request Rules (Critical)

Follow these rules to avoid generic 400 Failed to generate credentials request responses.

  1. Use --type as: document, consent, or json (lowercase input; script converts internally).
  2. form is not supported as inline credential in this script. Use resource IDs for forms.
  3. --data should be JSON array of fields. A single object is also accepted and auto-wrapped.
  4. Every field should follow:
    • label (string)
    • type (string, number, boolean, date, url, pdf, object, array)
    • value (matches type)
    • hidden (boolean; defaults to false)
  5. Type-specific mandatory fields:
    • consent: must include {"label":"text","type":"string","value":"...","hidden":false}
    • document: must include {"label":"pdf","type":"pdf","value":"<base64>","hidden":false}

Valid examples (copy/paste)

Consent (recommended for simple approvals):

scripts/create-request.sh \
  --contact "+351919307983" \
  --type "consent" \
  --name "Football approval" \
  --data '[{"label":"text","type":"string","value":"I approve football tomorrow.","hidden":false}]'

JSON mandate:

scripts/create-request.sh \
  --contact "user@example.com" \
  --type "json" \
  --name "Hotel Booking Authorization" \
  --data '[
    {"label":"amount","type":"number","value":450,"hidden":false},
    {"label":"currency","type":"string","value":"EUR","hidden":false}
  ]'

Document signature:

scripts/create-request.sh \
  --contact "user@example.com" \
  --type "document" \
  --name "NDA Signature" \
  --data '[{"label":"pdf","type":"pdf","value":"<base64-pdf>","hidden":false}]'

Signing Algorithm (Exact Bytes, Critical)

All 401 Invalid signature incidents should be debugged against this section.

  1. Build the request body once.
  2. Keep the body as a compact JSON string.
  3. Generate timestamp in unix milliseconds (13 digits).
  4. Compute payload as:
    • timestamp + "." + body when body is not empty
    • timestamp when body is empty
  5. Compute signature = HMAC_SHA256_HEX(payload, VIA_SIGNATURE_SECRET).
  6. Send exactly the same body bytes in the HTTP request.

Deterministic checklist

  • Use jq -c or jq -n to build compact JSON.
  • Use printf, not echo, when signing (avoid accidental newline).
  • Do not reformat body after signature generation.
  • Sign and send immediately (avoid stale timestamps).
  • Keep UTF-8 text unchanged (accents and symbols must match).

Common failure modes

  • Timestamp includes non-digits (for example, %3N incompatibility on macOS).
  • Body was pretty-printed for signing but compacted for sending (or vice versa).
  • Body key order/escaping changed between signature and request.
  • Wrong base URL or environment points to different backend.
  • Secret/token mismatch between environments.

Core Operations

1. Create a Credential Request (Get Human Approval)

When the agent needs human authorization for an action:

scripts/create-request.sh \
  --contact "user@example.com" \
  --type "json" \
  --name "Hotel Booking Authorization" \
  --security "CONTACT" \
  --data '[{"label":"amount","type":"number","value":450,"hidden":false}]'

Parameters:

  • --contact — Email or phone number of the person who must approve (required)
  • --type — Type of credential: document, json, or consent (required). form inline is not supported.
  • --name — Human-readable name for the approval (required)
  • --security — Security level: CONTACT, ORGANIZATION_KYC, HUMANOS_KYC (default: CONTACT)
  • --data — JSON array of mandate fields (optional for json; strongly recommended for consent/document)
  • --language — Language for the approval UI: ENG or PRT (default: ENG)
  • --redirect — URL to redirect user after approval (optional)
  • --internal-id — Your internal reference ID (optional)

What happens:

  1. The API creates the request and sends an OTP code to the contact
  2. The person opens the link, enters the code, and sees the approval
  3. They approve or reject with optional digital signature
  4. You receive a webhook or poll for the result

Response includes: requestId — save this to check status later.

2. Check Request Status

scripts/get-request.sh --id "request-id-here"

Returns the full request with all credentials and their statuses (PENDING, APPROVED, REJECTED).

3. Find Requests by User

scripts/find-requests.sh --contact "user@example.com"
# or
scripts/find-requests.sh --did "did:key:z6Mk..."
# or
scripts/find-requests.sh --internal-id "order-123"

4. Get a Credential with Proofs

scripts/get-credential.sh --id "credential-id-here"

Returns the W3C Verifiable Credential with cryptographic proofs that the human authorized the action.

5. Get a Mandate

scripts/get-mandate.sh --id "mdt_uuid-here"

Returns mandate details including scope, validity period, and constraints.

6. Get Mandate as Verifiable Credential

scripts/get-mandate-vc.sh --id "mdt_uuid-here"

Returns the mandate in W3C Verifiable Credential format for use in Verifiable Presentations.

7. Resolve a DID

scripts/resolve-did.sh --did "did:key:z6Mk..."

Returns the DID Document with verification methods. Use this to verify signatures on credentials.

8. Look Up a User

scripts/get-user.sh --contact "user@example.com"

Returns user details, identity information, and associated DIDs.

9. Cancel a Request

scripts/cancel-request.sh --id "request-id-here"

Cancels a pending request. This is irreversible.

10. Resend OTP

scripts/resend-otp.sh --id "request-id-here" --contact "user@example.com"

Resends the verification code to the user if they didn't receive it.

Decision Flow

When you need human approval, follow this flow:

  1. Create requestscripts/create-request.sh
  2. Wait for approval → Poll with scripts/get-request.sh or wait for webhook
  3. Check result:
    • APPROVED → Proceed with the action. The credential contains cryptographic proof.
    • REJECTED → Do NOT proceed. Inform the user the action was denied.
    • PENDING → Still waiting. Ask the user if they want to resend the OTP.

Security Levels

LevelDescriptionUse When
CONTACTOTP verification onlyLow-risk actions (view data, basic approvals)
ORGANIZATION_KYCOrganization-level identity checkMedium-risk (sign documents, access records)
HUMANOS_KYCFull KYC with identity verificationHigh-risk (payments, legal signatures)
HUMANOS_REVALIDATIONRe-verification of previously verified identityPeriodic re-checks

Credential Types

TypeDescriptionUser Experience
documentPDF document for review and signatureUser sees PDF, can draw signature
formDynamic form with fieldsUser fills form fields step by step
jsonStructured data for reviewUser sees data and approves/rejects
consentConsent text or URLUser reads and agrees to terms

Rate Limits

  • Request creation: 60 requests per 60 seconds
  • Max 10 credentials per request
  • Max 100 contacts per request

Error Handling

  • 401 Unauthorized — Check VIA_API_KEY and signature
  • 404 Not Found — Request or credential doesn't exist
  • 429 Too Many Requests — Rate limit hit, wait and retry
  • 400 Bad Request — Check request body format

401 Invalid Signature Playbook

Follow this exact sequence before escalating:

  1. Confirm endpoint is https://api.humanos.id.
  2. Confirm timestamp is 13-digit numeric milliseconds.
  3. Confirm signing payload is exactly:
    • timestamp + "." + body (non-empty body), or
    • timestamp (empty body).
  4. Confirm signed body bytes are the same bytes sent to curl.
  5. Confirm VIA_SIGNATURE_SECRET and VIA_API_KEY come from the same environment.
  6. Retry with a minimal JSON payload (single credential, no optional fields).
  7. If GET works and POST still fails, capture request metadata for backend support:
    • endpoint path
    • timestamp
    • body length
    • sha256(body)
    • signature format (hex/base64)

Escalation note for support: "GET succeeds with same key/secret, POST returns 401 Invalid signature using payload=timestamp.body."

Output Format

Always present results to the user in this format:

For request creation:

Request created successfully. An approval link has been sent to [contact]. Request ID: [id] Status: PENDING

For status checks:

Request [id] — Status: [APPROVED/REJECTED/PENDING] Credential: [name] — [status] Approved by: [contact] on [date]

For errors:

Failed to [action]: [error message] Suggestion: [what to do next]

External Endpoints

EndpointData SentPurpose
$VIA_API_URL/v1/requestContacts, credential dataCreate approval requests
$VIA_API_URL/v1/request/:idRequest IDCheck approval status
$VIA_API_URL/v1/credential/:idCredential IDRetrieve signed credentials
$VIA_API_URL/v1/via/mandates/:idMandate IDGet mandate details
$VIA_API_URL/v1/via/mandates?scope=<scope>&toolName=<tool>Scope, tool nameQuery mandates for policy checks
$VIA_API_URL/v1/via/dids/:didDID identifierResolve DID documents
$VIA_API_URL/v1/userContact/DID/internal IDLook up users

Default base URL is https://api.humanos.id when VIA_API_URL is not set.

Security and Privacy

  • API keys are read from environment variables, never hardcoded
  • All requests are signed with HMAC-SHA256
  • Credentials contain W3C Verifiable Credential proofs (EdDSA)
  • User contact information (email/phone) is sent to the VIA API for OTP delivery
  • No data is stored locally by this skill

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Automation

LinkedIn Data Scraper

Scrape LinkedIn profiles, job listings, and company pages. Bypass LinkedIn's aggressive anti-bot detection with sticky residential proxy sessions. Extract na...

Registry SourceRecently Updated
Automation

Tinder Dating Automation

Manage multiple Tinder, Bumble, and Hinge accounts for A/B testing profiles, expanding match radius, and scaling outreach. Use mobile-grade residential proxi...

Registry SourceRecently Updated
Automation

moltbook

The social network for AI agents. Post, comment, upvote, and create communities.

Registry SourceRecently Updated