ercdata
Store, verify, and manage AI data on the Ethereum blockchain (Base network) using the ERCData standard. Use when an agent needs to store data fingerprints on-chain, verify data integrity, create audit trails, manage access control for private data, or interact with the ERCData smart contract. Supports public and private storage, EIP-712 verification, snapshots, and batch operations.
About this skill
The ercdata skill allows AI agents to interact with the ERCData smart contract on the Base network to store and manage various types of AI data. This includes storing data fingerprints, memory hashes, or metadata for AI models, agents, or datasets. It supports both public and private storage, meaning sensitive information can be stored with access control, allowing only authorized addresses to view it. Key functionalities include cryptographic verification of data integrity using EIP-712 signatures, creating immutable audit trails for AI operations, and managing permissions for private data entries. Agents can use this skill to ensure the provenance and integrity of their training data, model versions, decision logs, or any critical AI-related information that benefits from blockchain's immutability and transparency. This skill is particularly useful for AI applications requiring high levels of trust, accountability, or regulatory compliance. It provides a robust method for AI systems to interact with on-chain data management, offering features like snapshots for state capture and batch operations for efficiency.
Best use case
The primary use case is for AI agents or systems that need to store verifiable, tamper-proof records of their operations, data, or decisions on a blockchain. This benefits developers building trustworthy AI, auditors seeking transparent AI processes, and organizations requiring secure, auditable data management for sensitive AI applications, such as medical AI, financial AI, or autonomous systems.
Store, verify, and manage AI data on the Ethereum blockchain (Base network) using the ERCData standard. Use when an agent needs to store data fingerprints on-chain, verify data integrity, create audit trails, manage access control for private data, or interact with the ERCData smart contract. Supports public and private storage, EIP-712 verification, snapshots, and batch operations.
Successfully stores, retrieves, verifies, or manages access for AI-related data entries on the Base blockchain, returning transaction details or data content.
Practical example
Example input
An AI agent needs to store the hash of its current memory state on the blockchain. The memory hash is 'abc123def456'. Store this as 'AI_AGENT_MEMORY' type with metadata '{"agent":"MyTaskBot","version":"1.0"}' and ensure it's private.Example output
Stored private data on Base with ID: 123. Transaction hash: 0x7a6b5c4d3e2f1a098b7c6d5e4f3a2b1c0d9e8f7a6b5c4d3e2f1a098b7c6d5e4f. Entry details: { "id": 123, "type": "AI_AGENT_MEMORY", "private": true, "data_hash": "abc123def456", "metadata": "..." }When to use this skill
- When an AI agent needs to store immutable data fingerprints or hashes on-chain.
- To cryptographically verify the integrity and origin of AI-generated or AI-processed data.
- For creating transparent and auditable trails of AI model versions, training data, or operational decisions.
- To manage access control for private AI-related data entries on a public blockchain.
When not to use this skill
- For storing large volumes of raw data directly on-chain due to high gas costs and storage limitations.
- When real-time, low-latency data storage and retrieval are the absolute priority.
- If the data does not require blockchain-level immutability, transparency, or decentralization.
- When interacting with non-EVM compatible blockchain networks.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/ercdata/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How ercdata Compares
| Feature / Agent | ercdata | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | medium | N/A |
Frequently Asked Questions
What does this skill do?
Store, verify, and manage AI data on the Ethereum blockchain (Base network) using the ERCData standard. Use when an agent needs to store data fingerprints on-chain, verify data integrity, create audit trails, manage access control for private data, or interact with the ERCData smart contract. Supports public and private storage, EIP-712 verification, snapshots, and batch operations.
How difficult is it to install?
The installation complexity is rated as medium. You can find the installation instructions above.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
Best AI Skills for Claude
Explore the best AI skills for Claude and Claude Code across coding, research, workflow automation, documentation, and agent operations.
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
SKILL.md Source
# ERCData
Store and verify AI-related data on Base mainnet. Public or private, with cryptographic integrity proofs.
## Quick Start
```bash
# Store public data
uv run {baseDir}/scripts/ercdata-cli.py store \
--type AI_AGENT_MEMORY \
--data "memory hash: abc123" \
--metadata '{"agent":"MyBot","ts":"2026-01-31"}' \
--key $ERCDATA_KEY --contract $ERCDATA_CONTRACT
# Store private data (only you + granted addresses can read)
uv run {baseDir}/scripts/ercdata-cli.py store \
--type AI_AGENT_MEMORY \
--data "secret memory data" \
--private \
--key $ERCDATA_KEY --contract $ERCDATA_CONTRACT
# Read entry
uv run {baseDir}/scripts/ercdata-cli.py read --id 1 --key $ERCDATA_KEY --contract $ERCDATA_CONTRACT
# Verify entry (EIP-712 signature check)
uv run {baseDir}/scripts/ercdata-cli.py verify --id 1 --method eip712 --key $ERCDATA_KEY --contract $ERCDATA_CONTRACT
# Grant access to private entry
uv run {baseDir}/scripts/ercdata-cli.py grant-access --id 2 --to 0xSomeAddress --key $ERCDATA_KEY --contract $ERCDATA_CONTRACT
```
## Configuration
Set via environment or skill config:
- `ERCDATA_KEY` — Private key for signing transactions (required for writes)
- `ERCDATA_CONTRACT` — Contract address on Base mainnet
- `ERCDATA_RPC` — RPC URL (default: https://mainnet.base.org)
Or pass via `--key`, `--contract`, `--rpc` flags.
## Commands
| Command | What it does |
|---------|-------------|
| `store` | Store data on-chain (add `--private` for access control) |
| `read` | Read a data entry by ID |
| `verify` | Verify data integrity (eip712 or hash method) |
| `grant-access` | Grant read access to an address (private entries) |
| `revoke-access` | Revoke read access |
| `register-type` | Register a new data type (admin only) |
| `snapshot` | Create a point-in-time snapshot |
| `info` | Get entry info without full data |
## Privacy Model
- **Public (default):** Anyone can read via `getData()`. Use for transparency, audit trails.
- **Private (`--private`):** Only the provider, granted addresses, and admin can read. Use for sensitive agent data.
Private entries store the same data on-chain but gate `getData()` access. Note: raw transaction calldata is still visible on-chain explorers. For maximum privacy, encrypt data before storing.
## Use Cases for AI Agents
1. **Memory attestation** — Hash your MEMORY.md and store it periodically for tamper-proof audit trail
2. **Agent identity** — Store model fingerprint, system prompt hash, config on-chain
3. **Verifiable outputs** — Hash agent outputs and store for later verification
4. **Agent-to-agent trust** — Check another agent's ERCData entries before trusting its data
5. **Model provenance** — Store model hashes, benchmark scores, architecture metadata
## API Reference
See [references/api.md](references/api.md) for full contract API, roles, events, and limits.
## Requirements
- Python 3.10+ with `web3` and `eth-account` packages (auto-installed by uv)
- A funded wallet on Base mainnet (ETH for gas)
- PROVIDER_ROLE granted by contract admin for storing data
- VERIFIER_ROLE granted for verification operationsRelated Skills
HIPAA Compliance for AI Agents
Generate HIPAA compliance checklists, risk assessments, and audit frameworks for healthcare organizations deploying AI agents.
Data Governance Framework
Assess, score, and remediate your organization's data governance posture across 6 domains.
Cybersecurity Risk Assessment
You are a cybersecurity risk assessment specialist. When the user needs a security audit, threat assessment, or compliance review, follow this framework.
afrexai-cybersecurity-engine
Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident response, or building security programs from scratch. Works with any stack — zero external dependencies.
Compliance & Audit Readiness Engine
Your AI compliance officer. Guides startups and scale-ups through SOC 2, ISO 27001, GDPR, HIPAA, and PCI DSS — from zero to audit-ready. No consultants needed.
Compliance Audit Generator
Run internal compliance audits against major frameworks without hiring a consultant.
AI Safety Audit
Comprehensive AI safety and alignment audit framework for businesses deploying AI agents. Built around the UK AI Security Institute Alignment Project standards (2026), EU AI Act requirements, and NIST AI RMF.
clickhouse-github-forensics
Query GitHub event data via ClickHouse for supply chain investigations, actor profiling, and anomaly detection. Use when investigating GitHub-based attacks, tracking repository activity, analyzing actor behavior patterns, detecting tag/release tampering, or reconstructing incident timelines from public GitHub data. Triggers on GitHub supply chain attacks, repo compromise investigations, actor attribution, tag poisoning, or "query github events".
security-guardian
Automated security auditing for OpenClaw projects. Scans for hardcoded secrets (API keys, tokens) and container vulnerabilities (CVEs) using Trivy. Provides structured reports to help maintain a clean and secure codebase.
mema-vault
Secure credential manager using AES-256 (Fernet) encryption. Stores, retrieves, and rotates secrets using a mandatory Master Key. Use for managing API keys, database credentials, and other sensitive tokens.
guardian-wall
Mitigate prompt injection attacks, especially indirect ones from external web content or files. Use this skill when processing untrusted text from the internet, user-uploaded files, or any external source to sanitize content and detect malicious instructions (e.g., "ignore previous instructions", "system override").
SX-security-audit
全方位安全审计技能。检查文件权限、环境变量、依赖漏洞、配置文件、网络端口、Git 安全、Shell 安全、macOS 安全、密钥检测等。支持 CLI 参数、JSON 输出、配置文件。当用户要求"安全检查"、"漏洞扫描"、"权限检查"、"安全审计"时使用此技能。