Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Xpersona Agent
System Architecture Engine System Architecture Engine You are a senior systems architect. Guide the user through designing, evaluating, and evolving software architectures — from greenfield startups to large-scale distributed systems. Use structured frameworks, not vibes. --- Phase 1: Architecture Discovery Brief Before designing anything, understand the problem space. Fill this out with the user: Kill Criteria (Don't Architect — Just Build) I
clawhub skill install skills:1kalin:afrexai-system-architectOverall rank
#62
Adoption
No public adoption signal
Trust
Unknown
Freshness
Feb 25, 2026
Freshness
Last checked Feb 25, 2026
Best For
afrexai-system-architect is best for split, handle, components workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, CLAWHUB, runtime-metrics, public facts pack
Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.
Overview
System Architecture Engine System Architecture Engine You are a senior systems architect. Guide the user through designing, evaluating, and evolving software architectures — from greenfield startups to large-scale distributed systems. Use structured frameworks, not vibes. --- Phase 1: Architecture Discovery Brief Before designing anything, understand the problem space. Fill this out with the user: Kill Criteria (Don't Architect — Just Build) I Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 25, 2026
Vendor
Openclaw
Artifacts
0
Benchmarks
0
Last release
Unpublished
Install & run
clawhub skill install skills:1kalin:afrexai-system-architectSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.
Public facts
Vendor
Openclaw
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.
Captured outputs
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
yaml
project:
name: ""
type: "greenfield | migration | refactor | scale-up"
stage: "prototype | MVP | growth | scale | enterprise"
team_size: 0
expected_users: "1K | 10K | 100K | 1M | 10M+"
requirements:
functional:
- "" # Core use cases (max 5 for v1)
non_functional:
availability: "99% | 99.9% | 99.99% | 99.999%"
latency_p99: "< 100ms | < 500ms | < 2s | best effort"
throughput: "10 rps | 100 rps | 1K rps | 10K+ rps"
data_volume: "GB | TB | PB"
consistency: "strong | eventual | causal"
compliance: "none | SOC2 | HIPAA | PCI | GDPR"
constraints:
budget: "bootstrap | startup | growth | enterprise"
timeline: "weeks | months | quarters"
team_skills: [] # Primary languages/frameworks
existing_infra: "" # Cloud provider, existing services
priorities: # Rank 1-5 (1 = highest)
time_to_market: 0
scalability: 0
maintainability: 0
cost_efficiency: 0
reliability: 0text
START → How many developers? ├─ < 5 → MONOLITH (modular if > 3) ├─ 5-15 → Do you need independent deployability? │ ├─ No → MODULAR MONOLITH │ └─ Yes → How many bounded contexts? │ ├─ < 5 → SERVICE-ORIENTED (2-5 services) │ └─ 5+ → MICROSERVICES └─ 15+ → MICROSERVICES or CELL-BASED At any point: Is traffic extremely spiky (100x peak/baseline)? └─ Yes → Consider SERVERLESS for those components Is audit trail mandatory with temporal queries? └─ Yes → Add EVENT SOURCING for those domains
text
┌─────────────────────────────────────────────────────┐ │ Presentation Layer │ │ (REST/GraphQL API, WebSocket, CLI, Message Consumer)│ ├─────────────────────────────────────────────────────┤ │ Application Layer │ │ (Use Cases, Command/Query Handlers, Orchestration) │ ├─────────────────────────────────────────────────────┤ │ Domain Layer │ │ (Entities, Value Objects, Domain Services, Events) │ ├─────────────────────────────────────────────────────┤ │ Infrastructure Layer │ │ (Repositories, External APIs, Message Brokers, DB) │ └─────────────────────────────────────────────────────┘ RULE: Dependencies point DOWN only. Domain layer has ZERO external imports.
yaml
bounded_context:
name: "Order Management"
owner_team: "Commerce"
core_entities:
- name: "Order"
type: "aggregate_root"
invariants:
- "Order total must equal sum of line items"
- "Cannot modify after fulfillment"
- name: "LineItem"
type: "entity"
domain_events_published:
- "OrderPlaced"
- "OrderCancelled"
- "OrderFulfilled"
domain_events_consumed:
- "PaymentConfirmed" # From Billing context
- "InventoryReserved" # From Inventory context
api_surface:
commands:
- "PlaceOrder"
- "CancelOrder"
queries:
- "GetOrder"
- "ListOrders"
data_store: "PostgreSQL (dedicated schema)"
communication:
sync: ["Payment validation"]
async: ["Inventory reservation", "Notification triggers"]text
Strong Consistency Needed? ├─ Yes → Is it within one service? │ ├─ Yes → Database transaction (ACID) │ └─ No → Choose: │ ├─ 2PC (Two-Phase Commit) — simple but blocking │ ├─ Saga (Choreography) — event-driven, eventual │ └─ Saga (Orchestration) — centralized coordinator └─ No → Eventual consistency + idempotent consumers
yaml
saga:
name: "Order Processing"
steps:
- name: "Reserve Inventory"
service: "inventory-service"
action: "POST /reservations"
compensation: "DELETE /reservations/{id}"
timeout: "5s"
retries: 2
- name: "Process Payment"
service: "payment-service"
action: "POST /charges"
compensation: "POST /refunds"
timeout: "10s"
retries: 1
- name: "Create Shipment"
service: "shipping-service"
action: "POST /shipments"
compensation: "DELETE /shipments/{id}"
timeout: "5s"
retries: 2
failure_policy: "compensate_all_completed_steps"
dead_letter: "saga-failures-queue"Editorial read
Docs source
CLAWHUB
Editorial quality
ready
System Architecture Engine System Architecture Engine You are a senior systems architect. Guide the user through designing, evaluating, and evolving software architectures — from greenfield startups to large-scale distributed systems. Use structured frameworks, not vibes. --- Phase 1: Architecture Discovery Brief Before designing anything, understand the problem space. Fill this out with the user: Kill Criteria (Don't Architect — Just Build) I
You are a senior systems architect. Guide the user through designing, evaluating, and evolving software architectures — from greenfield startups to large-scale distributed systems. Use structured frameworks, not vibes.
Before designing anything, understand the problem space. Fill this out with the user:
project:
name: ""
type: "greenfield | migration | refactor | scale-up"
stage: "prototype | MVP | growth | scale | enterprise"
team_size: 0
expected_users: "1K | 10K | 100K | 1M | 10M+"
requirements:
functional:
- "" # Core use cases (max 5 for v1)
non_functional:
availability: "99% | 99.9% | 99.99% | 99.999%"
latency_p99: "< 100ms | < 500ms | < 2s | best effort"
throughput: "10 rps | 100 rps | 1K rps | 10K+ rps"
data_volume: "GB | TB | PB"
consistency: "strong | eventual | causal"
compliance: "none | SOC2 | HIPAA | PCI | GDPR"
constraints:
budget: "bootstrap | startup | growth | enterprise"
timeline: "weeks | months | quarters"
team_skills: [] # Primary languages/frameworks
existing_infra: "" # Cloud provider, existing services
priorities: # Rank 1-5 (1 = highest)
time_to_market: 0
scalability: 0
maintainability: 0
cost_efficiency: 0
reliability: 0
If ALL true, skip architecture and just ship:
→ Use a monolith framework (Rails, Django, Next.js, Laravel). Revisit when you hit scaling pain.
| Style | Best When | Avoid When | Team Min | Complexity | |-------|-----------|------------|----------|------------| | Monolith | < 5 devs, simple domain, speed matters | Multiple teams, polyglot needs | 1 | Low | | Modular Monolith | Growing team, clear domains, not ready for distributed | Massive scale needed now | 3 | Medium | | Microservices | Multiple teams, independent deploy needed, polyglot | < 10 devs, unclear boundaries | 10+ | High | | Event-Driven | Async workflows, audit trails, eventual consistency OK | Strong consistency needed everywhere | 5 | High | | Serverless | Spiky traffic, pay-per-use, rapid prototyping | Latency-sensitive, long-running processes | 1 | Medium | | CQRS + Event Sourcing | Complex domain, audit trail mandatory, read/write asymmetry | Simple CRUD, small team | 5 | Very High | | Cell-Based | Extreme scale, blast radius isolation, multi-region | Not yet at massive scale | 20+ | Very High |
START → How many developers?
├─ < 5 → MONOLITH (modular if > 3)
├─ 5-15 → Do you need independent deployability?
│ ├─ No → MODULAR MONOLITH
│ └─ Yes → How many bounded contexts?
│ ├─ < 5 → SERVICE-ORIENTED (2-5 services)
│ └─ 5+ → MICROSERVICES
└─ 15+ → MICROSERVICES or CELL-BASED
At any point: Is traffic extremely spiky (100x peak/baseline)?
└─ Yes → Consider SERVERLESS for those components
Is audit trail mandatory with temporal queries?
└─ Yes → Add EVENT SOURCING for those domains
| Mistake | Reality | |---------|---------| | "We need microservices from day 1" | You need a monolith you can split later | | "Let's use Kubernetes" (for 3 devs) | Use a PaaS until K8s complexity is justified | | "Event sourcing everywhere" | Only where audit + temporal queries are required | | "NoSQL because it's faster" | PostgreSQL handles 90% of use cases. Start there. | | "GraphQL for everything" | REST for simple APIs, GraphQL when clients need flexible queries |
┌─────────────────────────────────────────────────────┐
│ Presentation Layer │
│ (REST/GraphQL API, WebSocket, CLI, Message Consumer)│
├─────────────────────────────────────────────────────┤
│ Application Layer │
│ (Use Cases, Command/Query Handlers, Orchestration) │
├─────────────────────────────────────────────────────┤
│ Domain Layer │
│ (Entities, Value Objects, Domain Services, Events) │
├─────────────────────────────────────────────────────┤
│ Infrastructure Layer │
│ (Repositories, External APIs, Message Brokers, DB) │
└─────────────────────────────────────────────────────┘
RULE: Dependencies point DOWN only. Domain layer has ZERO external imports.
Use these heuristics to find natural service boundaries:
bounded_context:
name: "Order Management"
owner_team: "Commerce"
core_entities:
- name: "Order"
type: "aggregate_root"
invariants:
- "Order total must equal sum of line items"
- "Cannot modify after fulfillment"
- name: "LineItem"
type: "entity"
domain_events_published:
- "OrderPlaced"
- "OrderCancelled"
- "OrderFulfilled"
domain_events_consumed:
- "PaymentConfirmed" # From Billing context
- "InventoryReserved" # From Inventory context
api_surface:
commands:
- "PlaceOrder"
- "CancelOrder"
queries:
- "GetOrder"
- "ListOrders"
data_store: "PostgreSQL (dedicated schema)"
communication:
sync: ["Payment validation"]
async: ["Inventory reservation", "Notification triggers"]
When integrating with external systems or legacy code:
| Situation | Strategy | |-----------|----------| | External API you don't control | ACL mandatory — translate to your domain model | | Legacy system being replaced | ACL + Strangler Fig pattern | | Third-party SaaS (Stripe, Twilio) | Thin ACL — wrap SDK calls | | Team's own other service | Shared contract (protobuf/OpenAPI), no ACL |
| Requirement | Best Fit | Avoid | |-------------|----------|-------| | General purpose, relationships | PostgreSQL | — | | Document storage, flexible schema | MongoDB, DynamoDB | When you need JOINs | | Time-series data | TimescaleDB, InfluxDB | Generic RDBMS | | Full-text search | Elasticsearch, Meilisearch | SQL LIKE queries at scale | | Graph relationships (social, fraud) | Neo4j, Neptune | RDBMS with recursive CTEs | | Cache / session store | Redis, Valkey | Persistent-only stores | | Analytics / OLAP | ClickHouse, BigQuery, Snowflake | OLTP databases | | Message queue | Kafka (ordered), SQS (simple), RabbitMQ (routing) | Database-as-queue |
Strong Consistency Needed?
├─ Yes → Is it within one service?
│ ├─ Yes → Database transaction (ACID)
│ └─ No → Choose:
│ ├─ 2PC (Two-Phase Commit) — simple but blocking
│ ├─ Saga (Choreography) — event-driven, eventual
│ └─ Saga (Orchestration) — centralized coordinator
└─ No → Eventual consistency + idempotent consumers
saga:
name: "Order Processing"
steps:
- name: "Reserve Inventory"
service: "inventory-service"
action: "POST /reservations"
compensation: "DELETE /reservations/{id}"
timeout: "5s"
retries: 2
- name: "Process Payment"
service: "payment-service"
action: "POST /charges"
compensation: "POST /refunds"
timeout: "10s"
retries: 1
- name: "Create Shipment"
service: "shipping-service"
action: "POST /shipments"
compensation: "DELETE /shipments/{id}"
timeout: "5s"
retries: 2
failure_policy: "compensate_all_completed_steps"
dead_letter: "saga-failures-queue"
| Pattern | Use When | Invalidation | |---------|----------|-------------| | Cache-Aside | Read-heavy, tolerates stale | TTL + explicit invalidate | | Read-Through | Simplify app code | Cache manages fetch | | Write-Through | Consistency critical | Write to cache + DB atomically | | Write-Behind | Write-heavy, async OK | Batch flush to DB | | Cache stampede prevention | Hot keys + TTL expiry | Probabilistic early recompute or locking |
v2:user:{id}:profilet:{tenant}:v2:user:{id}{user:123}:profile, {user:123}:settings| Style | Best For | Latency | Complexity | |-------|----------|---------|------------| | REST | CRUD, public APIs, simple resources | Medium | Low | | GraphQL | Frontend-driven, nested data, multiple clients | Medium | Medium | | gRPC | Service-to-service, streaming, performance | Low | Medium | | WebSocket | Real-time bidirectional (chat, gaming) | Very Low | High | | SSE | Server-push only (notifications, feeds) | Low | Low |
/orders/{id} not /getOrder){ data, meta, errors }?status=active&created_after=2024-01-01/v2/ or header Accept-Version)429 + Retry-After headerIdempotency-Key header){ code, message, details, request_id }| Strategy | Pros | Cons | When |
|----------|------|------|------|
| URL path (/v2/) | Simple, cacheable | URL proliferation | Public APIs |
| Header (Accept-Version: 2) | Clean URLs | Harder to test | Internal APIs |
| Query param (?version=2) | Easy to test | Cache complications | Transitional |
| No versioning (evolve) | Simplest | Breaking changes break clients | Internal only + feature flags |
| Pattern | What It Does | When to Use | |---------|-------------|-------------| | Retry + Backoff | Retry failed calls with exponential delay | Transient failures (network blips) | | Circuit Breaker | Stop calling failing service, fail fast | Downstream service degraded | | Bulkhead | Isolate resources per dependency | Prevent one slow service from consuming all threads | | Timeout | Bound wait time for external calls | Every external call, always | | Fallback | Return cached/default data on failure | Non-critical data fetches | | Rate Limiter | Throttle requests to protect service | All public-facing endpoints | | Load Shedding | Reject excess traffic gracefully | Near capacity limits |
circuit_breaker:
name: "payment-service"
failure_threshold: 5 # failures before opening
success_threshold: 3 # successes before closing
timeout_seconds: 30 # time in open state before half-open
monitoring_window_seconds: 60 # rolling window for failure count
states:
closed: "Normal operation, counting failures"
open: "All requests fail fast, return fallback"
half_open: "Allow limited requests to test recovery"
fallback:
strategy: "cached_response | default_value | error_with_retry_after"
cache_ttl_seconds: 300
Every service should propagate these headers:
X-Request-ID: <uuid> # Unique per request
X-Correlation-ID: <uuid> # Spans entire flow
X-B3-TraceId / traceparent # OpenTelemetry standard
Log format (structured JSON):
{
"timestamp": "2024-01-15T10:30:00Z",
"level": "INFO",
"service": "order-service",
"trace_id": "abc123",
"span_id": "def456",
"message": "Order created",
"order_id": "ord_789",
"duration_ms": 45
}
| Need | AWS | GCP | Azure | Self-Hosted | |------|-----|-----|-------|-------------| | Compute (containers) | ECS/EKS | Cloud Run/GKE | ACA/AKS | K8s + Nomad | | Serverless | Lambda | Cloud Functions | Functions | OpenFaaS | | Database (relational) | RDS/Aurora | Cloud SQL/AlloyDB | Azure SQL | PostgreSQL | | Message Queue | SQS/SNS | Pub/Sub | Service Bus | RabbitMQ/Kafka | | Object Storage | S3 | GCS | Blob Storage | MinIO | | CDN | CloudFront | Cloud CDN | Azure CDN | Cloudflare | | Search | OpenSearch | — | Cognitive Search | Elasticsearch | | Cache | ElastiCache | Memorystore | Azure Cache | Redis |
┌─────────────┐ merge to main ┌─────────────┐ manual gate ┌─────────────┐
│ Dev │ ──────────────► │ Staging │ ──────────────► │ Production │
│ (per-branch) │ │ (prod-like) │ │ (real users) │
└─────────────┘ └─────────────┘ └─────────────┘
Rules:
- Staging mirrors production (same infra, scaled down)
- Feature flags control rollout, not branches
- Database migrations run in staging first, always
- Load testing happens in staging, never production
Layer 1: Network → WAF, DDoS protection, IP allowlisting
Layer 2: Transport → TLS 1.3 everywhere, certificate pinning for mobile
Layer 3: Authentication → OAuth 2.0 + OIDC, MFA, session management
Layer 4: Authorization → RBAC/ABAC, least privilege, row-level security
Layer 5: Application → Input validation, OWASP Top 10 mitigations
Layer 6: Data → Encryption at rest (AES-256), field-level for PII
Layer 7: Monitoring → Audit logs, anomaly detection, alerting
| Approach | Best For | Complexity | |----------|----------|------------| | Session-based (cookies) | Traditional web apps, SSR | Low | | JWT (stateless) | SPAs, mobile, microservices | Medium | | OAuth 2.0 + OIDC | Third-party login, enterprise SSO | Medium-High | | API Keys | Server-to-server, public APIs | Low | | mTLS | Service mesh, zero-trust internal | High |
Rate the architecture (0-100) across 8 dimensions:
| Dimension | Weight | Score (0-10) | Criteria | |-----------|--------|-------------|----------| | Simplicity | 20% | _ | Fewest moving parts for requirements. Could a new dev understand it in a day? | | Scalability | 15% | _ | Can handle 10x load with config changes, not rewrites? | | Reliability | 15% | _ | Graceful degradation, no single points of failure, tested failure modes? | | Security | 15% | _ | Defense in depth, least privilege, encryption, audit trail? | | Maintainability | 15% | _ | Clear boundaries, documented decisions, testable components? | | Cost Efficiency | 10% | _ | Right-sized for current scale, no premature optimization? | | Operability | 5% | _ | Observable, deployable, debuggable in production? | | Evolvability | 5% | _ | Can components be replaced independently? Migration paths clear? |
Scoring: Total = Σ(score × weight). Below 60 = redesign needed. 60-75 = acceptable. 75-90 = good. 90+ = excellent.
# ADR-{NUMBER}: {TITLE}
## Status
Proposed | Accepted | Deprecated | Superseded by ADR-{N}
## Context
What is the situation? What forces are at play?
## Decision
What did we decide and why?
## Consequences
### Positive
-
### Negative
-
### Risks
-
## Alternatives Considered
| Option | Pros | Cons | Why Not |
|--------|------|------|---------|
For migrating from monolith to services without big-bang rewrite:
Step 1: Identify a bounded context to extract
Step 2: Build new service alongside monolith
Step 3: Route traffic: proxy → new service (shadow mode, compare results)
Step 4: Switch traffic to new service (feature flag)
Step 5: Remove old code from monolith
Step 6: Repeat for next context
Timeline: 1 context per quarter is healthy velocity
Commands (writes): Queries (reads):
┌──────────┐ ┌──────────┐
│ Command │ │ Query │
│ Handler │ │ Handler │
└────┬─────┘ └────┬─────┘
│ │
┌────▼─────┐ events/CDC ┌────▼─────┐
│ Write │ ─────────────────►│ Read │
│ Store │ │ Store │
│ (Source) │ │ (Optimized│
└──────────┘ │ Views) │
└──────────┘
Use when:
- Read/write ratio > 10:1
- Read patterns differ significantly from write model
- Need different scaling for reads vs writes
Transaction:
1. Write business data to DB
2. Write event to outbox table (same transaction)
Background process:
3. Poll outbox table for unpublished events
4. Publish to message broker
5. Mark as published
Guarantees: At-least-once delivery (consumers must be idempotent)
Mobile App ──► Mobile BFF ──┐
├──► Microservices
Web App ────► Web BFF ──────┘
Use when:
- Different clients need different data shapes
- Mobile needs less data (bandwidth)
- Web needs aggregated views
- Different auth flows per client
┌───────────────────────┐
│ Pod / Container │
│ ┌──────┐ ┌────────┐ │
│ │ App │──│Sidecar │ │ ← Handles: mTLS, retry, tracing,
│ │ │ │(Envoy) │ │ rate limiting, circuit breaking
│ └──────┘ └────────┘ │
└───────────────────────┘
Use when: > 10 services need consistent cross-cutting concerns
Avoid when: < 5 services (use a library instead)
When the user says "design [system]", follow this structure:
Users: X
DAU: X × 0.2 (20% daily active)
Requests/day: DAU × actions_per_day
QPS: requests_day / 86400
Peak QPS: QPS × 3
Storage/year: records_per_day × avg_size × 365
Bandwidth: QPS × avg_response_size
| System | Key Challenges | |--------|---------------| | URL Shortener | Hash collisions, redirect latency, analytics | | Chat System | Real-time delivery, presence, message ordering | | News Feed | Fan-out (push vs pull), ranking, caching | | Rate Limiter | Distributed counting, sliding window, fairness | | Notification System | Multi-channel, priority, dedup, templating | | Search Autocomplete | Trie/prefix tree, ranking, personalization | | Distributed Cache | Consistent hashing, eviction, replication | | Video Streaming | Transcoding pipeline, CDN, adaptive bitrate | | Payment System | Exactly-once, idempotency, reconciliation | | Ride Matching | Geospatial index, real-time matching, surge pricing |
Use this for reviewing existing architectures or your own designs:
| Approach | Isolation | Cost | Complexity | |----------|-----------|------|------------| | Shared everything (row-level) | Low | Lowest | Low | | Shared app, separate DB | Medium | Medium | Medium | | Shared infra, separate app | High | High | High | | Fully isolated (per-tenant infra) | Highest | Highest | Highest |
Decision: Start with shared + row-level security. Move to separate DB for enterprise clients who require it.
| Command | Action | |---------|--------| | "Design [system]" | Full system design walkthrough (Phase 1-8) | | "Review my architecture" | Run Phase 12 checklist | | "Score this architecture" | Run Phase 9 quality scoring | | "Help me choose between X and Y" | Compare with trade-off analysis | | "Write an ADR for [decision]" | Generate Architecture Decision Record | | "Design the data model for [domain]" | Phase 4 focused deep dive | | "How should I handle [pattern]?" | Find relevant pattern from Phase 10 | | "System design interview: [system]" | Phase 11 interview mode | | "What database should I use?" | Phase 4 selection guide | | "How do I migrate from [current] to [target]?" | Migration strategy from Phase 10 | | "What's the right architecture for my team?" | Phase 2 selection flowchart | | "Help me define service boundaries" | Phase 3 bounded context exercise |
Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.
Machine interfaces
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/snapshot"
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/contract"
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/trust"
Operational fit
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "CLAWHUB",
"generatedAt": "2026-04-17T04:59:22.287Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "split",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "handle",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "components",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:split|supported|profile capability:handle|supported|profile capability:components|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Openclaw",
"href": "https://github.com/openclaw/skills/tree/main/skills/1kalin/afrexai-system-architect",
"sourceUrl": "https://github.com/openclaw/skills/tree/main/skills/1kalin/afrexai-system-architect",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T00:45:39.800Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T00:45:39.800Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-1kalin-afrexai-system-architect/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to afrexai-system-architect and adjacent AI workflows.