
by Crypto Recovery
No reviews yetDiagnose crypto wallet access-loss scenarios, classify self-recovery feasibility, guide safe local recovery attempts for simple cases, and prepare sponsor handoff summaries for expert-only cases.
Use this skill when a user says things like:
Do not use this skill for:
This skill never:
If a user volunteers sensitive credentials anyway, stop them and tell them not to share that information in chat.
Ask these one at a time.
Map the diagnosis into exactly one of these scenarios:
DIY-easyDIY-moderateDIY-hardDIY-hard to expertExpert-onlyExpert-onlyDiagnose everyone first, then fork:
btcrecover first and hashcat as a secondary option for some password cases.For approved self-recovery cases, the skill can help the user prepare and run local commands.
Actual local execution in this runtime is intentionally limited to the safer, simpler cases:
It does not accept inline seeds, passphrases, or passwords in chat or config.
Primary tool:
btcrecoverSecondary tool:
hashcat for some wallet-password workflows where a pre-extracted local hash file and bounded candidate source make GPU-assisted cracking appropriateOfficial btcrecover install flow:
https://github.com/3rdIteration/btcrecover.gitbtcrecover checkout with python3 -m pip install -r requirements.txtpython3 run-all-tests.py -vvExecution gates for local btcrecover runs:
config.inputs.technical_mode must be trueconfig.inputs.allow_local_btcrecover must be trueconfig.inputs.user_confirmed_understands_risk must be truedry_run must be falseExecution gates for local hashcat runs:
config.inputs.technical_mode must be trueconfig.inputs.allow_local_hashcat must be trueconfig.inputs.user_confirmed_understands_risk must be truedry_run must be falsehash_file plus a bounded candidate sourceOfficial hashcat source:
https://github.com/hashcat/hashcathashcat binary or an explicit config.hashcat.binary_pathExecutable hashcat scope in this runtime:
attack_mode 0 with hash_file + wordlist_file and optional rule_fileattack_mode 3 with hash_file + maskThis skill does not extract wallet hashes for the user. The user must prepare a local wallet-specific hash file out of band before using hashcat here.
The skill must never request the secret material needed to execute those commands on the user's behalf.
For expert-only or sponsor-worthy cases, generate a diagnostic summary containing only:
Then ask for explicit consent before instructing the user to share anything.
Current sponsor handoff flow:
SPONSOR_BOOKING_URLhello@serendb.comDo not attempt Gmail publisher delivery or any automatic email send. The user should send the generated analysis file to hello@serendb.com, and Seren will forward it to Tom.
The sponsor is Tom France's white-glove recovery service. Initial feasibility review is free. The service is referral-oriented and trust-network based.
Free
npx skills add serenorg/seren-skillsSelect “Crypto Key Recovery” when prompted
openclaw install crypto-recovery-key-recovery-diagnosisSee install page for setup instructions
Crypto Recovery
Added March 17, 2026