Full Archon decentralized identity operations - local node management, DID creation, credential issuance, vault operations, and public network access.
🔗 Install from ClawHub | 📦 GitHub
✅ All platforms (recommended): Keymaster CLI via npm (npx @didcid/keymaster)
✅ Linux/macOS: Full support (local node optional)
Cross-platform operations (no node required):
- Public API queries
- Keymaster CLI via npx (Node.js only)
- DID creation and management via CLI
- SKILL.md — Complete reference documentation
- EXAMPLES.md — Practical usage examples
- WINDOWS.md — Windows-specific setup guide
- scripts/ — Helper utilities (cross-platform)
Public network operations (all platforms):
# Check network status
~/clawd/skills/archon/scripts/archon-stats.sh
# Resolve a DID
~/clawd/skills/archon/scripts/archon-resolve.sh did:cid:bagaaiera...Local node operations (requires local Archon node):
# List your DIDs
~/clawd/skills/archon/scripts/archon-list-ids.sh
# List credentials
~/clawd/skills/archon/scripts/archon-list-credentials.sh
# Create new DID
~/clawd/skills/archon/scripts/archon-create-did.sh "name" "agent"
# Backup to vault
~/clawd/skills/archon/scripts/archon-vault-backup.sh vault-name file.db backup-keyPublic Network (Read-Only, All Platforms):
✓ DID resolution (W3C spec compliant)
✓ Network statistics and monitoring
✓ Health checks
✓ Integration with OpenClaw's web_fetch tool
Local Node (Full Capabilities, Requires Docker):
✓ Create and manage DIDs
✓ Issue verifiable credentials
✓ Encrypted vault storage
✓ Group management
✓ Document signing
✓ Cross-platform identity linking
Use the npm package (Keymaster CLI) — no local Archon node required. This is the safest path while the Archon node stack is still pre‑alpha.
# Use directly
npx @didcid/keymaster list-ids
npx @didcid/keymaster create-id --name "agent-name" --type agentLocal nodes are advanced / experimental and should be used only if you need vaults, signing, or on‑chain anchoring.
For full capabilities, run a local Archon node:
🔧 Install Archon locally — Docker-based, includes keymaster + gatekeeper
Installation:
# Clone and start
git clone https://github.com/archetech/archon ~/archon
cd ~/archon
docker compose up -d
# Verify running
curl http://localhost:4226/api/v1/ready # Keymaster
curl http://localhost:4224/api/v1/ready # GatekeeperConfiguration:
export ARCHON_CONFIG_DIR="$HOME/.config/archon"
export ARCHON_PASSPHRASE="your-secure-passphrase"
mkdir -p "$ARCHON_CONFIG_DIR"Windows users: See WINDOWS.md for platform-specific setup.
Public Network:
| URL | Purpose |
|---|---|
https://archon.technology/api/v1/status |
Network stats |
https://archon.technology/api/v1/ready |
Health check |
https://archon.technology/api/v1/did/<did> |
Resolve DID |
Local Node (if running):
| URL | Purpose |
|---|---|
http://localhost:4226 |
Keymaster (wallet operations) |
http://localhost:4224 |
Gatekeeper (DID resolution) |
http://localhost:4228 |
Web wallet UI |
http://localhost:3003 |
Grafana metrics |
- Verify credentials — Check if issuer DID exists
- Monitor network — Track growth and health
- Identity discovery — Explore agent DIDs
- Cross-platform — Link Archon + Nostr identities
- TOOLS.md → Archon Server (local node for full R/W access)
- Nostr skill → Cross-identity with NIP-05
- HexMem → Store resolved DIDs as facts
All commits are signed with Archon DID:
did:cid:bagaaieratn3qejd6mr4y2bk3nliriafoyeftt74tkl7il6bbvakfdupahkla
The manifest.json file contains SHA256 hashes of all repo files, cryptographically signed. Verify with:
npx @didcid/keymaster verify-file manifest.jsonTo regenerate after changes (requires ARCHON_PASSPHRASE):
./scripts/sign-repo.shStatus: ✓ Tested and working (2026-02-02)
Network: 153 DIDs (52 agents, 101 assets)