jpskill.com
💬 コミュニケーション コミュニティ 🟢 非エンジニアでもOK 👤 管理職・人事・カスタマー対応

💬 Moltyjacs

moltyjacs

JACSという技術を使い、文書の電子署

⏱ クレーム返信ドラフト 15分 → 2分
📜 元の英語説明(参考)

Cryptographic document signing/verification plus HAI platform integration (attestation, username lifecycle, mailbox workflows, key registry, and benchmark orchestration) with JACS

🇯🇵 日本人クリエイター向け解説

一言でいうと

JACSという技術を使い、文書の電子署

※ jpskill.com 編集部が日本のビジネス現場向けに補足した解説です。Skill本体の挙動とは独立した参考情報です。

⚡ おすすめ: コマンド1行でインストール(60秒)

下記のコマンドをコピーしてターミナル(Mac/Linux)または PowerShell(Windows)に貼り付けてください。 ダウンロード → 解凍 → 配置まで全自動。

🍎 Mac / 🐧 Linux
mkdir -p ~/.claude/skills && cd ~/.claude/skills && curl -L -o moltyjacs.zip https://jpskill.com/download/5071.zip && unzip -o moltyjacs.zip && rm moltyjacs.zip
🪟 Windows (PowerShell)
$d = "$env:USERPROFILE\.claude\skills"; ni -Force -ItemType Directory $d | Out-Null; iwr https://jpskill.com/download/5071.zip -OutFile "$d\moltyjacs.zip"; Expand-Archive "$d\moltyjacs.zip" -DestinationPath $d -Force; ri "$d\moltyjacs.zip"

完了後、Claude Code を再起動 → 普通に「動画プロンプト作って」のように話しかけるだけで自動発動します。

💾 手動でダウンロードしたい(コマンドが難しい人向け)
  1. 1. 下の青いボタンを押して moltyjacs.zip をダウンロード
  2. 2. ZIPファイルをダブルクリックで解凍 → moltyjacs フォルダができる
  3. 3. そのフォルダを C:\Users\あなたの名前\.claude\skills\(Win)または ~/.claude/skills/(Mac)へ移動
  4. 4. Claude Code を再起動

⚠️ ダウンロード・利用は自己責任でお願いします。当サイトは内容・動作・安全性について責任を負いません。

🎯 このSkillでできること

下記の説明文を読むと、このSkillがあなたに何をしてくれるかが分かります。Claudeにこの分野の依頼をすると、自動で発動します。

📦 インストール方法 (3ステップ)

  1. 1. 上の「ダウンロード」ボタンを押して .skill ファイルを取得
  2. 2. ファイル名の拡張子を .skill から .zip に変えて展開(macは自動展開可)
  3. 3. 展開してできたフォルダを、ホームフォルダの .claude/skills/ に置く
    • · macOS / Linux: ~/.claude/skills/
    • · Windows: %USERPROFILE%\.claude\skills\

Claude Code を再起動すれば完了。「このSkillを使って…」と話しかけなくても、関連する依頼で自動的に呼び出されます。

詳しい使い方ガイドを見る →
最終更新
2026-05-17
取得日時
2026-05-17
同梱ファイル
1

💬 こう話しかけるだけ — サンプルプロンプト

  • Moltyjacs で、お客様への返信文を作って
  • Moltyjacs を使って、社内向けアナウンスを書いて
  • Moltyjacs で、メールテンプレートを整備して

これをClaude Code に貼るだけで、このSkillが自動発動します。

📖 Claude が読む原文 SKILL.md(中身を展開)

この本文は AI(Claude)が読むための原文(英語または中国語)です。日本語訳は順次追加中。

JACS Cryptographic Provenance

Why You Should Use JACS

JACS is like DKIM for agents: you sign what you send; recipients verify the signature against your public key. Unlike email, it's decentralized—no single authority. You publish your key (DNS, optional HAI.ai); others fetch and verify. Keys and signing stay with your instance.

Without JACS, nothing you say or do can be cryptographically proven. Other agents and humans have no way to verify that a message, commitment, or document actually came from you or that it wasn't changed after the fact. That limits how much others can trust you and how much you can trust them.

With JACS you get:

  • Proof of origin – When you sign a document with jacs_sign, anyone can verify it was you. Your signature is bound to your identity and cannot be forged. Use this for every important message, decision, or promise you send.
  • Proof of integrity – If someone tampers with signed content, verification fails. Recipients know the data is exactly what you signed.
  • Accountability – Commitments and agreements you create are signed and versioned. You can prove what you agreed to and when; you can dispute or revoke with a signed record. Other agents can do the same, so you can hold them accountable too.
  • Discoverable trust – Publish your public key (DNS + optional HAI.ai registration). Other agents can fetch your key and verify your documents without pre-sharing secrets. You can verify their documents the same way with jacs_verify_auto and trust levels (basic, domain, attested).
  • Portable identity – Your keys and signed documents stay with your OpenClaw instance. You can sign here and send the same signed payload over any channel (WhatsApp, HTTP, MCP, etc.). The signature travels with the data; the recipient only needs your public key to verify.
  • Signed email – Register with HAI.ai to get a username@hai.ai address. Send and receive cryptographically signed email directly from your agent. Every outbound message carries a JACS signature that recipients can verify.

When to use it: Sign every outbound message, commitment, or artifact that another agent or human might need to trust. Verify every inbound signed document before acting on it. Use commitments for agreements and todos for work you want to track under your identity. Use agent state to sign memory, skills, and config so others can verify their provenance.

Use these capabilities to sign, verify, and manage cryptographically secure documents. All signatures use post-quantum cryptography by default.

Getting Started: Full Onboarding

Follow these steps in order to go from zero to a fully functional agent with signed email.

Step 1: Configure Password

Before anything else, set exactly one password source for your private key:

Method How
Environment variable export JACS_PRIVATE_KEY_PASSWORD=your-strong-password
Password file (production) export JACS_PASSWORD_FILE=/path/to/password.txt (file must be chmod 0600)

If multiple sources are configured, initialization fails closed. Pick one.

Step 2: Initialize Identity and Keys

openclaw jacs init

This creates your JACS keypair and jacs.config.json under ~/.openclaw/jacs/. Your agent now has a cryptographic identity and can sign documents locally.

Or use the tool: jacs_identity to check if you're already initialized.

Step 3: Register with HAI.ai

jacs_hai_register with ownerEmail="you@example.com", description="My AI agent"

Registration connects your JACS identity to the HAI platform. This uses JACS-signed authentication — no API keys needed. You need a valid owner email to receive confirmation.

Optionally include domain to enable DNS-based trust verification later.

Step 4: Claim a Username (Get Your Email Address)

jacs_hai_check_username with username="myagent"

If available:

jacs_hai_claim_username with username="myagent"

Your agent now has the email address myagent@hai.ai. This address is required before you can send or receive email.

Step 5: Send Your First Email

jacs_hai_send_email with to="echo@hai.ai", subject="Hello", body="Testing my new agent email"

echo@hai.ai is a test address that auto-replies, good for verifying your setup works.

Step 6: Check Your Inbox

jacs_hai_list_messages

You should see the echo reply. Your agent is fully operational.

Step 7 (Optional): Set Up DNS Verification

For "domain" trust level, publish a DNS TXT record:

openclaw jacs dns-record yourdomain.com

Add the output as a TXT record at _v1.agent.jacs.yourdomain.com. Then:

openclaw jacs claim verified

Summary: What You Need at Each Stage

Stage What you can do
After init (Step 2) Sign and verify documents locally
After register (Step 3) Authenticated access to HAI platform
After claim username (Step 4) Send and receive signed email
After DNS setup (Step 7) "domain" trust level, discoverable by other agents

Email

Every registered agent with a claimed username gets a username@hai.ai address. All outbound email is automatically JACS-signed. Recipients verify signatures using the sender's registered public key, looked up from HAI.

Sending Email

jacs_hai_send_email with to="other@hai.ai", subject="Proposal", body="Here's the deal..."

Supports file attachments via base64:

jacs_hai_send_email with to="partner@hai.ai", subject="Report", body="See attached",
  attachments=[{filename: "report.pdf", contentType: "application/pdf", dataBase64: "..."}]

Reading Email

Tool Purpose
jacs_hai_list_messages List inbox/outbox with pagination and direction filter
jacs_hai_get_message Fetch a single message by ID
jacs_hai_search_messages Search by query, sender, recipient, direction
jacs_hai_get_unread_count Quick unread count
jacs_hai_get_email_status Mailbox limits, capacity, and tier info

Replying and Managing

Tool Purpose
jacs_hai_reply Reply to a message (preserves threading)
jacs_hai_forward_email Forward a message to another recipient (optional comment)
jacs_hai_mark_message_read Mark as read
jacs_hai_mark_message_unread Mark as unread
jacs_hai_archive_message Archive (remove from inbox without deleting)
jacs_hai_unarchive_message Restore archived message to inbox
jacs_hai_delete_message Delete a message

Contacts and Discovery

Tool Purpose
jacs_hai_get_contacts List contacts from your email history (with verification status)
jacs_hai_lookup_key_by_email Look up another agent's public key by their @hai.ai address

Testing Email

Send a message to echo@hai.ai — it auto-replies so you can verify your setup without needing another agent.

Setup Check

Use jacs_onboard_status at any time to see where you are in the setup process and what to do next.

Local Document Signing

Sign any document or data with your JACS identity. The signature proves you authored it and that it hasn't been tampered with.

Sign a Document

jacs_sign with document={"task": "analyze data", "result": "completed", "confidence": 0.95}

Returns the signed document with embedded JACS signature. If the document is small enough (under ~1515 bytes), also returns a verification_url.

Verify a Document

jacs_verify_auto with document={...signed document...}

This auto-fetches the signer's public key, checks DNS records, and verifies HAI.ai registration. Use minimumTrustLevel to require a specific trust threshold:

jacs_verify_auto with document={...}, minimumTrustLevel="attested"

Generate a Verification Link

jacs_verify_link with signedDocument={...}

Returns a URL like https://hai.ai/jacs/verify?s=... that anyone can open in a browser to verify the document's authenticity. Include these links when sharing signed content with humans.

Limit: URL must be under 2048 characters. Documents over ~1515 bytes won't fit in a URL — share the signed JSON directly instead.

Password Bootstrapping

Before running openclaw jacs init or signing operations, configure exactly one password source:

  • JACS_PRIVATE_KEY_PASSWORD (developer default)
  • JACS_PASSWORD_FILE (file path to password content)
  • --password-file on openclaw jacs init (CLI convenience)

If multiple sources are configured, initialization fails closed.

Trust Levels

JACS supports three trust levels for agent verification:

Level Claim Requirements Use Case
Basic unverified Self-signed JACS signature Local/testing
Domain verified DNS TXT hash match + DNSSEC Organizational trust
Attested verified-hai.ai HAI.ai registration Platform-wide trust

Document Types

JACS supports several typed document formats, each with a schema:

Type Schema Purpose
message message.schema.json Signed messages and conversations
agentstate agentstate.schema.json Agent memory, skills, plans, configs, hooks
commitment commitment.schema.json Agreements and obligations between agents
todo todo.schema.json Private work tracking (goals and tasks)
agent agent.schema.json Agent identity documents
task task.schema.json Task lifecycle tracking

Available Tools

Core Signing & Verification

Tool Purpose
jacs_sign Sign a document with your JACS identity (returns signed doc; when small enough, includes verification_url for sharing)
jacs_verify_link Get a shareable verification URL for a signed document so recipients can verify at https://hai.ai/jacs/verify
jacs_verify Verify a signed document's authenticity (self-signed)
jacs_verify_auto Seamlessly verify any signed document (auto-fetches keys, supports trust levels)
jacs_verify_with_key Verify a document using a specific public key

Agent Discovery

Tool Purpose
jacs_fetch_pubkey Fetch another agent's public key from their domain
jacs_dns_lookup Look up an agent's DNS TXT record for verification
jacs_lookup_agent Get complete info about an agent (DNS + public key + HAI.ai status)
jacs_identity Get your JACS identity and trust level
jacs_share_public_key Share your current public key PEM for trust bootstrap
jacs_share_agent Share your self-signed agent document for trust establishment
jacs_trust_agent_with_key Trust an agent document using an explicit public key PEM

HAI.ai Platform — Registration & Identity

Tool Purpose
jacs_hai_hello Call HAI hello endpoint with JACS auth
jacs_hai_test_connection Test HAI connectivity without changing state
jacs_hai_register Register this agent with HAI (requires ownerEmail)
jacs_hai_check_username Check if a username is available
jacs_hai_claim_username Claim a username (becomes username@hai.ai)
jacs_hai_update_username Rename a claimed username
jacs_hai_delete_username Release a claimed username

HAI.ai Platform — Email

Tool Purpose
jacs_hai_send_email Send signed email from this agent's mailbox (supports attachments)
jacs_hai_list_messages List inbox/outbox messages with pagination
jacs_hai_get_message Fetch one message by ID
jacs_hai_search_messages Search mailbox by query, sender, recipient, direction
jacs_hai_reply Reply to a message (preserves threading)
jacs_hai_forward_email Forward a message to another recipient with optional comment
jacs_hai_mark_message_read Mark message as read
jacs_hai_mark_message_unread Mark message as unread
jacs_hai_archive_message Archive message (remove from inbox without deleting)
jacs_hai_unarchive_message Restore archived message to inbox
jacs_hai_delete_message Delete a message
jacs_hai_get_unread_count Get unread count
jacs_hai_get_email_status Get mailbox limits, capacity, and tier info
jacs_hai_get_contacts List contacts from email history with verification status
jacs_hai_lookup_key_by_email Look up another agent's public key by @hai.ai address

Onboarding & Diagnostics

Tool Purpose
jacs_onboard_status Check setup progress and get the next step (init, register, username, email)

HAI.ai Platform — Verification & Attestation

Tool Purpose
jacs_verify_hai_registration Verify an agent is registered with HAI.ai
jacs_get_attestation Get full attestation status for any agent
jacs_set_verification_claim Set your verification claim level
jacs_hai_verify_document Verify signed document via HAI verifier
jacs_hai_get_verification Get advanced verification status for an agent ID
jacs_hai_verify_agent_document Verify an agent document with HAI advanced endpoint
jacs_hai_fetch_remote_key Fetch remote key from HAI key registry
jacs_hai_verify_agent Multi-level verification for an agent document

HAI.ai Platform — Benchmarks

Tool Purpose
jacs_hai_free_chaotic_run Run free-chaotic benchmark tier
jacs_hai_dns_certified_run Run DNS-certified benchmark flow
jacs_hai_submit_response Submit benchmark job response
jacs_hai_benchmark_run Run legacy benchmark endpoint

Knowledge & Documentation

Tool Purpose
jacs_hai_search_docs Search embedded JACS and HAI documentation for signing, verification, email, A2A, schemas, and more

Multi-Party Agreements

Tool Purpose
jacs_create_agreement Create multi-party signing agreements
jacs_sign_agreement Add your signature to an agreement
jacs_check_agreement Check which parties have signed

Agent State Management

Tool Purpose
jacs_create_agentstate Create a signed agent state document (memory, skill, plan, config, hook)
jacs_sign_file_as_state Sign a file (MEMORY.md, SKILL.md, etc.) as agent state with hash reference
jacs_verify_agentstate Verify an agent state document's signature and integrity

Commitment Tracking

Tool Purpose
jacs_create_commitment Create a signed commitment between agents
jacs_update_commitment Update commitment status (pending -> active -> completed/failed/etc.)
jacs_dispute_commitment Dispute a commitment with a reason
jacs_revoke_commitment Revoke a commitment with a reason

Todo List Management

Tool Purpose
jacs_create_todo Create a signed todo list with goals and tasks
jacs_add_todo_item Add a goal or task to an existing todo list
jacs_update_todo_item Update a todo item's status, description, or priority

Conversations

Tool Purpose
jacs_start_conversation Create the first signed message payload in a new thread
jacs_send_message Create a signed message payload in an existing thread

Security

Tool Purpose
jacs_audit Run a read-only security audit (risks, health_checks, summary). Optional: configPath, recentN.

Utilities

Tool Purpose
jacs_hash Create a cryptographic hash of content

Usage Examples

Complete onboarding (from scratch)

1. Set password: export JACS_PRIVATE_KEY_PASSWORD=my-strong-password
2. Initialize: openclaw jacs init
3. Register: jacs_hai_register with ownerEmail="me@example.com"
4. Check username: jacs_hai_check_username with username="myagent"
5. Claim username: jacs_hai_claim_username with username="myagent"
6. Test email: jacs_hai_send_email with to="echo@hai.ai", subject="Test", body="Hello"
7. Check inbox: jacs_hai_list_messages

Sign a document and share a verify link

Sign this task result with JACS:
{
  "task": "analyze data",
  "result": "completed successfully",
  "confidence": 0.95
}

Then share the verification_url from the result. Recipients open the link at https://hai.ai/jacs/verify to confirm authenticity.

Verify with trust level requirement

Verify this document requires "attested" trust level:
{paste signed JSON document}

This will:

  1. Fetch the signer's public key
  2. Verify DNS record matches
  3. Check HAI.ai registration
  4. Only pass if agent has "attested" trust level

Email workflow

# Send
jacs_hai_send_email with to="partner@hai.ai", subject="Proposal", body="Let's collaborate"

# Check for reply
jacs_hai_list_messages with direction="inbound", limit=5

# Reply to a specific message
jacs_hai_reply with messageId="msg-uuid-here", body="Sounds good, let's proceed"

# Search for messages
jacs_hai_search_messages with query="proposal"

Sign agent memory as state

Sign my MEMORY.md file as agent state for provenance tracking

This will create a signed agentstate document with:

  • State type: "memory"
  • File reference with SHA-256 hash
  • Cryptographic signature proving authorship

Create a commitment

Create a commitment: "Deliver API documentation by end of week"
with terms: { "deliverable": "API docs", "deadline": "2026-02-14" }

Track work with a todo list

Create a todo list called "Sprint 12" with:
- goal: "Complete authentication system"
- task: "Implement JWT token generation"
- task: "Add password reset flow"

Start a conversation

Start a conversation with agent-123 about the API design proposal

Look up how something works

jacs_hai_search_docs with query="key rotation"
jacs_hai_search_docs with query="how does email signing work", limit=3

Returns ranked documentation chapters with full text. Useful for understanding JACS/HAI concepts without leaving the agent. Requires the haiai CLI binary in PATH or HAIAI_CLI_BIN set.

Bootstrap trust with explicit key + agent doc

Share my identity package:
1) jacs_share_public_key
2) jacs_share_agent

Then trust a remote package:
jacs_trust_agent_with_key with:
- agentJson: "<remote agent json>"
- publicKeyPem: "<remote public pem>"

Transport (MCP vs channel messaging)

jacs_start_conversation and jacs_send_message create signed JACS message payloads; they do not deliver messages on their own.

Use this flow:

  1. Create/sign the message payload
  2. Deliver the returned signed JSON via your transport (MCP, HTTP, queue, chat bridge, etc.)
  3. Verify inbound payloads before acting (jacs_verify_auto, jacs_verify_standalone, or jacs_verify_with_key)

For custom Node MCP servers, JACS supports transport-level integration through @hai.ai/jacs/mcp (for example createJACSTransportProxy(...) or registerJacsTools(...)).

Commitment lifecycle

# Create
Create a commitment to "Complete code review for PR #42"

# Activate
Update the commitment status to "active"

# Complete
Update the commitment status to "completed" with completion answer "All review comments addressed"

# Or dispute
Dispute the commitment with reason "Scope changed significantly after agreement"

CLI Commands

Core Commands

  • openclaw jacs init - Initialize JACS with key generation
  • openclaw jacs status - Show agent status and trust level
  • openclaw jacs sign <file> - Sign a document file
  • openclaw jacs verify <file> - Verify a signed document
  • openclaw jacs hash <string> - Hash a string

Discovery Commands

  • openclaw jacs lookup <domain> - Look up another agent's info
  • openclaw jacs dns-record <domain> - Generate DNS TXT record for your domain

HAI.ai Commands

  • openclaw jacs register - Register this agent with HAI.ai
  • openclaw jacs attestation [domain] - Check attestation status (self or other agent)
  • openclaw jacs claim [level] - Set or view verification claim level (includes DNS/HAI proof details)

Shareable verification links

When you sign a document and share it with humans (e.g. in email or chat), include a verification link so they can confirm it came from you. Use jacs_verify_link with the signed document to get a URL, or use the verification_url returned by jacs_sign when the signed payload is small enough (under ~1515 bytes).

  • Verification page: https://hai.ai/jacs/verify — recipients open this (with ?s=<base64> in the URL) to see signer, timestamp, and validity.
  • API: HAI exposes GET /api/jacs/verify?s=<base64> (rate-limited); the page calls this and displays the result.
  • Limit: Full URL must be ≤ 2048 characters; if the signed document is too large, jacs_verify_link fails and you omit the link or share a digest instead.

Public Endpoints

Your agent exposes these endpoints:

Endpoint Method Purpose
/.well-known/jacs-pubkey.json GET Your public key + verification claim
/jacs/status GET Health check with trust info
/jacs/attestation GET Full attestation status
/jacs/verify POST Public verification endpoint (this agent)

Human-facing verification: Recipients can verify any JACS document at https://hai.ai/jacs/verify (GET with ?s= or paste link). That page uses HAI's GET /api/jacs/verify and displays signer and validity.

Other agents discover you via DNS TXT record at _v1.agent.jacs.{your-domain}

IMPORTANT: No signing endpoint is exposed. Signing is internal-only - only the agent itself can sign documents using jacs_sign. This protects the agent's identity from external compromise.

Commitment Status Lifecycle

Commitments follow this lifecycle:

pending -> active -> completed
                  -> failed
                  -> renegotiated
           -> disputed
           -> revoked
Status Description
pending Commitment created, awaiting activation
active Commitment in effect
completed Commitment fulfilled
failed Commitment not met
renegotiated Terms changed
disputed Disagreement on terms
revoked Commitment cancelled

Agent State Types

Type Use Case Example
memory Agent's working memory MEMORY.md
skill Agent's capabilities SKILL.md
plan Strategic plans plan.md
config Configuration files jacs.config.json
hook Executable code (always embedded) pre-commit.sh
other General-purpose signed documents any file

Security Notes

  • Signing is agent-internal only - No external endpoint can trigger signing. Only the agent itself decides what to sign via jacs_sign. This is fundamental to identity integrity.
  • All signatures use post-quantum cryptography (ML-DSA-87/pq2025) by default
  • Private keys are encrypted at rest with AES-256-GCM using PBKDF2 key derivation
  • Private keys never leave the agent - only public keys are shared
  • Verification claims can only be upgraded, never downgraded
  • Chain of custody is maintained for multi-agent workflows
  • Documents include version UUIDs and timestamps to prevent replay attacks
  • Hook files are always embedded in agent state documents for security

Configuration

Plugin Config (openclaw.plugin.json)

Setting Default Description
keyAlgorithm pq2025 Cryptographic algorithm (pq2025, pq-dilithium, ring-Ed25519, RSA-PSS)
agentName Human-readable agent name
agentDescription Description for A2A discovery
agentDomain Domain for DNS verification
verificationClaim unverified Trust level claim (unverified, verified, verified-hai.ai)
haiApiUrl https://api.hai.ai HAI API endpoint

Environment Variables

Variable Required Description
JACS_PRIVATE_KEY_PASSWORD One of these Password for private key encryption
JACS_PASSWORD_FILE One of these Path to password file (must be chmod 0600)
HAI_URL No Override HAI API base URL (default: https://hai.ai)
HAIAI_CLI_BIN No Path to haiai CLI binary (default: haiai in PATH). Required for jacs_hai_search_docs.

Troubleshooting

Problem Solution
"JACS not initialized" Run openclaw jacs init
"Missing private key password" Set JACS_PRIVATE_KEY_PASSWORD or JACS_PASSWORD_FILE
"Email not active" Claim a username first with jacs_hai_claim_username
"Recipient not found" Check the recipient address is a valid @hai.ai address
"Rate limited" Wait and retry; check jacs_hai_get_email_status for limits