Claim this agent
Agent DossierCLAWHUBSafety 84/100

Xpersona Agent

secretcodex

Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. --- name: secretcodex description: Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. metadata: openclaw: emoji: "🔐" version: "1.0.0" author: "AM" tags: ["cryp

OpenClaw · self-declared
Trust evidence available
clawhub skill install skills:akhmittra:secretcodex

Overall rank

#62

Adoption

No public adoption signal

Trust

Unknown

Freshness

Feb 25, 2026

Freshness

Last checked Feb 25, 2026

Best For

secretcodex is best for read, be, manage workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, CLAWHUB, runtime-metrics, public facts pack

Overview

Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.

Verifiededitorial-content

Overview

Executive Summary

Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. --- name: secretcodex description: Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. metadata: openclaw: emoji: "🔐" version: "1.0.0" author: "AM" tags: ["cryp Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.

No verified compatibility signals

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Feb 25, 2026

Vendor

Openclaw

Artifacts

0

Benchmarks

0

Last release

Unpublished

Install & run

Setup Snapshot

clawhub skill install skills:akhmittra:secretcodex
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence & Timeline

Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.

Verifiededitorial-content

Public facts

Evidence Ledger

Vendor (1)

Vendor

Openclaw

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Artifacts & Docs

Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.

Self-declaredCLAWHUB

Captured outputs

Artifacts Archive

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

text

CODE NAME OPTIONS:

1. Operation Silver Dawn
   - Silver: Premium, valuable, reflective
   - Dawn: New beginning, fresh start
   - Phonetic: SILVER DON
   - Use case: "Silver Dawn is go for launch"

2. Project Velocity Edge
   - Velocity: Speed, momentum, progress
   - Edge: Cutting-edge, advantage, boundary
   - Phonetic: vuh-LOSS-ih-tee EDJ
   
3. Initiative Catalyst Prime
   - Catalyst: Trigger change, accelerate
   - Prime: First-class, optimal, ready
   
4. Operation Horizon Shift
   - Horizon: Future, vision, expansion
   - Shift: Change, transformation

5. Project Apex Launch
   - Apex: Peak, highest point, summit
   - Launch: Beginning, deployment

Recommendation: "Operation Silver Dawn" - 
Professional, aspirational, easy to remember and say.

text

Plaintext: MEET ME AT NOON
Key: Shift 3
Ciphertext: PHHW PH DW QRRQ

M → P (shift 3)
E → H (shift 3)
E → H (shift 3)
T → W (shift 3)

text

Plaintext: SECRET MESSAGE
Ciphertext: FRPERG ZRFFNTR

S → F (shift 13)
E → R (shift 13)
...

text

Plaintext: HIDDEN
Ciphertext: SRWWVM

H → S (A=Z, B=Y, ... H=S)
I → R
D → W
D → W
E → V
N → M

text

# Grid 1:        # Grid 2:
    A|B|C           J|K|L
   -+-+-           -+-+-
    D|E|F           M|N|O
   -+-+-           -+-+-
    G|H|I           P|Q|R

# X-Grid 1:     # X-Grid 2:
   S   T            W   X
     X              X
   U   V            Y   Z

text

Plaintext: HELLO
Symbols: [H][E][L][L][O]

H = bottom-left of first grid
E = middle of first grid
L = top-right of second grid
L = top-right of second grid
O = middle of second grid

Editorial read

Docs & README

Docs source

CLAWHUB

Editorial quality

ready

Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. --- name: secretcodex description: Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. metadata: openclaw: emoji: "🔐" version: "1.0.0" author: "AM" tags: ["cryp

Full README

name: secretcodex description: Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. metadata: openclaw: emoji: "🔐" version: "1.0.0" author: "AM" tags: ["cryptography", "cipher", "encryption", "decoding", "secret-messages", "code-names", "security"] requires: bins: [] env: [] config: []

SecretCodex

Description

SecretCodex brings back the magic of decoder rings from your childhood cereal boxes, but with the sophistication of modern cryptography. Generate creative code names for operations and team members, encode secret messages using multiple cipher methods, and decode messages from trusted contacts—all with keys that you control and share manually with intended recipients.

Perfect for:

  • 🎯 Creating code names for projects, operations, or team members
  • 🔒 Sending secret messages between friends, family, or team
  • 🎓 Learning cryptography through hands-on practice
  • 🎮 Adding mystery to games, scavenger hunts, or puzzles
  • 🎪 Fun challenges and brain teasers
  • 📝 Private notes that only you (and your key-holders) can read

Core Philosophy

Security through obscurity is weak. Security through strong ciphers + key management is powerful.

SecretCodex teaches you both:

  • Simple ciphers (fun, educational, quick)
  • Sophisticated ciphers (stronger, layered, secure)
  • Hybrid methods (combine multiple techniques)
  • Key management (the real secret to cryptography)

1. Code Name Generator

Before you encode messages, you need great code names! SecretCodex generates creative, memorable names for operations, projects, or individuals.

Code Name Styles

Operation Names (Mission/Project Codenames)

Format: [Adjective] + [Noun]

Examples:

  • Operation Silent Thunder
  • Operation Crimson Falcon
  • Operation Midnight Protocol
  • Operation Steel Horizon
  • Operation Quantum Shield

Generation Strategy:

  • Choose a tone (stealthy, powerful, technical, natural, mythical)
  • Pair evocative adjective with strong noun
  • Avoid obvious connections to actual project

Personal Codenames (Agent/Team Member Names)

Format: Single word or [Title] + [Element]

Examples:

  • Phoenix (rebirth, fire)
  • Cipher (encryption, secrecy)
  • Raven (intelligence, mystery)
  • Atlas (strength, reliability)
  • Echo (communication, repetition)
  • Agent Frost (cool, calculated)
  • The Architect (strategic, builder)

Generation Strategy:

  • Consider person's role or traits
  • Use animals, elements, concepts, or titles
  • Make it memorable and easy to say

Location Codenames

Format: Geographic-sounding but fictional

Examples:

  • Raven's Point (meeting location)
  • Glacier Station (server location)
  • Meridian Hub (coordination center)

Code Name Generation Process

User provides:

  • Type (operation, person, location)
  • Tone (serious, playful, technical, mysterious)
  • Optional themes (nature, technology, mythology, colors)

SecretCodex generates:

  • 5-10 options with meanings
  • Phonetic spellings (for radio clarity)
  • Alternatives if first choice is compromised

Example:

User: "Generate a code name for our Q1 product launch project. Tone: Exciting but professional."

SecretCodex:

CODE NAME OPTIONS:

1. Operation Silver Dawn
   - Silver: Premium, valuable, reflective
   - Dawn: New beginning, fresh start
   - Phonetic: SILVER DON
   - Use case: "Silver Dawn is go for launch"

2. Project Velocity Edge
   - Velocity: Speed, momentum, progress
   - Edge: Cutting-edge, advantage, boundary
   - Phonetic: vuh-LOSS-ih-tee EDJ
   
3. Initiative Catalyst Prime
   - Catalyst: Trigger change, accelerate
   - Prime: First-class, optimal, ready
   
4. Operation Horizon Shift
   - Horizon: Future, vision, expansion
   - Shift: Change, transformation

5. Project Apex Launch
   - Apex: Peak, highest point, summit
   - Launch: Beginning, deployment

Recommendation: "Operation Silver Dawn" - 
Professional, aspirational, easy to remember and say.

2. Classic Ciphers (Decoder Ring Era)

Caesar Cipher (Alphabetic Shift)

How it works: Shift each letter forward or backward in the alphabet by a fixed number.

Key: Shift amount (1-25)

Example:

Plaintext: MEET ME AT NOON
Key: Shift 3
Ciphertext: PHHW PH DW QRRQ

M → P (shift 3)
E → H (shift 3)
E → H (shift 3)
T → W (shift 3)

Decoding: Shift backward by the same amount.

Strength: ⭐☆☆☆☆ (Very weak - only 25 possible keys) Best for: Kids, quick messages, nostalgia


ROT13 (Caesar Shift by 13)

How it works: Special case of Caesar cipher with shift of 13. Encoding = Decoding (symmetric).

Key: None needed (always shift 13)

Example:

Plaintext: SECRET MESSAGE
Ciphertext: FRPERG ZRFFNTR

S → F (shift 13)
E → R (shift 13)
...

Strength: ⭐☆☆☆☆ (Very weak - single fixed key) Best for: Quick obfuscation, forum spoilers, simple hiding


Atbash Cipher (Reverse Alphabet)

How it works: Replace A with Z, B with Y, C with X, etc. (reverse alphabet)

Key: None (fixed pattern)

Example:

Plaintext: HIDDEN
Ciphertext: SRWWVM

H → S (A=Z, B=Y, ... H=S)
I → R
D → W
D → W
E → V
N → M

Strength: ⭐☆☆☆☆ (Very weak - no key variation) Best for: Quick reversal, simple codes


Pigpen Cipher (Symbol Substitution)

How it works: Replace letters with geometric symbols based on grids.

Key: Grid arrangement (standard or custom)

Grid Pattern:

# Grid 1:        # Grid 2:
    A|B|C           J|K|L
   -+-+-           -+-+-
    D|E|F           M|N|O
   -+-+-           -+-+-
    G|H|I           P|Q|R

# X-Grid 1:     # X-Grid 2:
   S   T            W   X
     X              X
   U   V            Y   Z

Example:

Plaintext: HELLO
Symbols: [H][E][L][L][O]

H = bottom-left of first grid
E = middle of first grid
L = top-right of second grid
L = top-right of second grid
O = middle of second grid

Strength: ⭐⭐☆☆☆ (Weak - pattern recognition) Best for: Visual encoding, kids, scavenger hunts


3. Intermediate Ciphers (Getting Stronger)

Polybius Square (Grid Coordinates)

How it works: Letters arranged in 5×5 grid (I/J combined). Each letter = row + column.

Key: Grid arrangement (can be scrambled)

Standard Grid:

  1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z

Example:

Plaintext: ATTACK
Ciphertext: 11 44 44 11 13 25

A = row 1, col 1 = 11
T = row 4, col 4 = 44
T = row 4, col 4 = 44
A = row 1, col 1 = 11
C = row 1, col 3 = 13
K = row 2, col 5 = 25

Strength: ⭐⭐☆☆☆ (Weak alone, strong when combined) Best for: Numeric encoding, combining with other methods


Vigenère Cipher (Keyword-Based Shift)

How it works: Like Caesar but the shift changes for each letter based on a keyword.

Key: Keyword or phrase (longer = stronger)

Example:

Plaintext: ATTACK AT DAWN
Key:       SECRETSECRETSE
Ciphertext: SXVRGD SX HSAS

A + S = S (0+18 mod 26)
T + E = X (19+4 mod 26)
T + C = V (19+2 mod 26)
A + R = R (0+17 mod 26)
C + E = G (2+4 mod 26)
K + T = D (10+19 mod 26)
...

Vigenère Square (for reference):

    A B C D E F ...
A | A B C D E F ...
B | B C D E F G ...
C | C D E F G H ...
... (26×26 grid)

Decoding: Use keyword to shift backward.

Strength: ⭐⭐⭐☆☆ (Moderate - strong if long keyword) Best for: Keyword-based secrecy, shared phrase keys


Rail Fence Cipher (Transposition)

How it works: Write message in zigzag pattern across multiple rails, read off by rows.

Key: Number of rails (2-10)

Example with 3 rails:

Plaintext: THISISASECRET

Writing pattern (3 rails):
T . . . S . . . E . . . T     Rail 1: T S E T
. H . S . I . A . S . C . E   Rail 2: H S I A S C E
. . I . . . S . . . R . .     Rail 3: I S R

Ciphertext: TSET HSIASECE ISR (read row by row)
Compact: TSETHSIASCEEISR

Decoding: Know number of rails, reverse the zigzag write.

Strength: ⭐⭐☆☆☆ (Weak - pattern-based) Best for: Visual rearrangement, combining with substitution


4. Advanced Ciphers (Modern Sophistication)

Playfair Cipher (Digraph Substitution)

How it works: Encrypt pairs of letters using a 5×5 keyed grid. Much stronger than single-letter substitution.

Key: Keyword creates the grid

Grid Creation:

  1. Write keyword (remove duplicates)
  2. Fill rest with unused alphabet letters
  3. Combine I/J

Example with keyword "MONARCHY":

M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z

Encryption Rules:

  • If both letters in same row: shift right
  • If both in same column: shift down
  • If forming rectangle: swap corners

Example:

Plaintext: HE LL OW OR LD (pairs)
Key: MONARCHY

HE: H=row2,col2 E=row3,col1 → Rectangle → EB
LL: L=row4,col1 L=row4,col1 → Insert X: LX → LXLX
OW: O=row1,col2 W=row5,col3 → Rectangle → AZ
OR: O=row1,col2 R=row1,col5 → Same row → NA
LD: L=row4,col1 D=row2,col5 → Rectangle → UD

Ciphertext: EB LZ OL AZ NA UD

Strength: ⭐⭐⭐⭐☆ (Strong - resists frequency analysis) Best for: Serious encoding, resisting decryption


Columnar Transposition (Keyword-Ordered)

How it works: Write message in rows, read columns in keyword-alphabetical order.

Key: Keyword determines column order

Example:

Plaintext: ATTACK AT DAWN
Key: ZEBRA (alphabetical: ABERZ = 52143)

Write in 5 columns under keyword:
Z E B R A
---------
A T T A C
K A T D A
W N X X X (padding)

Read columns in alphabetical order (A E B R Z):
Column A (5): C A X
Column E (2): T A N
Column B (3): T T X
Column R (4): A D X
Column Z (1): A K W

Ciphertext: CAXTANTТXADXAKW
Compact: CAXTANTTXADXAKW

Strength: ⭐⭐⭐☆☆ (Moderate - order is key) Best for: Scrambling message structure


One-Time Pad (Theoretically Unbreakable)

How it works: Each message encrypted with truly random key, used only once, same length as message.

Key: Random string same length as plaintext (MUST be truly random, MUST be used only once)

Example:

Plaintext: HELLO
Key:       XMCKL (truly random, never reused)

H + X = E (7+23 mod 26)
E + M = Q (4+12 mod 26)
L + C = N (11+2 mod 26)
L + K = V (11+10 mod 26)
O + L = Z (14+11 mod 26)

Ciphertext: EQNVZ

CRITICAL: Key must be:

  • Truly random (not pseudo-random)
  • Same length as message
  • Used only ONCE (hence "one-time")
  • Securely shared ahead of time

Strength: ⭐⭐⭐⭐⭐ (Perfect if used correctly) Best for: Maximum security (if you can manage true randomness and single-use keys)


5. Hybrid Ciphers (Layered Security)

Double Encryption (Two-Step Process)

Method: Apply two different ciphers sequentially

Example: Vigenère + Rail Fence

Step 1: Vigenère with keyword "FORTRESS"
Plaintext: MEET ME AT THE BRIDGE
Key: FORTRESSFORTRESSFO
Result: RXJG ZR UG GUR VKWQTR

Step 2: Rail Fence with 3 rails
Input: RXJGZRUGGURVIIWQTR
Output: RJZGRTVR XGUGUKWT RI (rail-encoded)

Final Ciphertext: RJZGRTVХGUGUKWTГRI

Decoding: Reverse order (Rail Fence first, then Vigenère)

Strength: ⭐⭐⭐⭐☆ (Much stronger than either alone)


Polybius + Vigenère

Method: Convert to numbers, then shift with keyword

Example:

Step 1: Polybius Square
Plaintext: HELLO
Numbers: 23 15 31 31 34

Step 2: Vigenère on Numbers
Key: SECRET = 18 14 12 17 14 19
Add key to numbers (mod 100):
23+18=41, 15+14=29, 31+12=43, 31+17=48, 34+14=48

Final Ciphertext: 41 29 43 48 48

Strength: ⭐⭐⭐⭐☆ (Numeric + alphabetic layers)


6. Key Generation & Management

The most important part of cryptography: KEY MANAGEMENT

Key Types

1. Shift/Rotation Keys (Simple)

  • Number (1-25 for Caesar)
  • Direction (forward/backward)
  • Example: "ROT13", "Shift +7"

2. Keyword Keys (Intermediate)

  • Word or phrase
  • Longer = stronger
  • Memorable but not obvious
  • Example: "FORTRESS", "PURPLE ELEPHANT"

3. Random Keys (Advanced)

  • Truly random characters
  • One-time use (OTP)
  • Must be securely shared
  • Example: "XQPVHGKLMNZRT"

4. Grid/Pattern Keys (Visual)

  • Grid arrangement (Polybius, Playfair)
  • Symbol mapping (Pigpen variants)
  • Example: "Grid arranged by keyword MONARCH"

Key Sharing Methods (Manual)

How to share your key securely:

  1. In-Person Exchange (Most secure)

    • Whisper the key
    • Write on paper, watch them memorize, destroy paper
    • Use pre-arranged code phrases
  2. Separate Channel (Good)

    • Send encrypted message via email
    • Send key via text message (different platform)
    • Never both on same channel
  3. Pre-Arranged Keys (Best for ongoing)

    • Agree on keyword/pattern before separation
    • Use shared secret (inside joke, date, location)
    • Change periodically
  4. Physical Key Exchange (Creative)

    • Hide key in letter, send via mail
    • Encode key using simpler cipher
    • Use drop location for key card

Key Security Rules:

  • ❌ Never send key with encrypted message on same channel
  • ❌ Never reuse one-time pad keys
  • ✅ Change keys regularly
  • ✅ Destroy old keys after use
  • ✅ Memorize when possible

7. Practical Usage Examples

Example 1: Secret Meeting Coordination

Scenario: You need to tell your friend where and when to meet, but you're communicating in a public group chat.

Solution:

Code Names:
- You: "Phoenix"
- Friend: "Atlas"
- Meeting spot: "Raven's Point" (actually the north library entrance)
- Time: Use Vigenère

Message Setup:
Plaintext: MEET AT RAVENS POINT AT THREE PM
Cipher: Vigenère
Key: FORTRESS (shared in-person last week)

Encoding:
M+F=R, E+O=S, E+R=V, T+T=M, ...

Encrypted: RXJG UG KHEVLA UTVRM UG GLVJJ TZ

Sent Message:
"Phoenix to Atlas: RXJG UG KHEVLA UTVRM UG GLVJJ TZ"

Friend decodes using FORTRESS key → Meets you at Raven's Point (north library) at 3pm

Example 2: Scavenger Hunt Clues

Scenario: Creating secret clues for a treasure hunt.

Solution:

Clue 1 (Simple - Caesar Shift 5):
Plaintext: LOOK UNDER THE OAK TREE
Ciphertext: QTTP ZSIJW YMJ TPF YWJJ

Clue 2 (Medium - Rail Fence 4 rails):
Plaintext: THE TREASURE IS IN THE SHED
Ciphertext: TEUEIHHE RSRSNSDE TISHETDR

Clue 3 (Hard - Playfair with keyword HUNTER):
Plaintext: FINAL PRIZE BEHIND DOOR TWO
(Encrypted with Playfair)
Ciphertext: GHPBM QXFBH CHAKMB ENNX VVS

Each clue progressively harder, keys provided when previous clue found.

Example 3: Private Journal Entries

Scenario: You want to keep a journal that's private even if someone reads it.

Solution:

Method: Double Vigenère (two different keywords)

First Pass:
Plaintext: TODAY I LEARNED SOMETHING IMPORTANT
Key 1: JOURNAL
Ciphertext 1: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV

Second Pass:
Plaintext: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV
Key 2: PRIVATE
Ciphertext 2: RVPCQ G KXIGXFT SGDTHSOTZ EIAXQVYOX

Final encrypted entry goes in journal.
Only you know both keys to decrypt.

Example 4: Team Communication

Scenario: Remote team needs to share sensitive project info.

Solution:

Code Name System:
- Project: "Operation Silver Dawn"
- Team members: Phoenix, Atlas, Cipher, Raven
- Milestones: Alpha, Bravo, Charlie, Delta

Sensitive Message Encoding:
Method: Columnar Transposition + Substitution
Key: Team keyword "SILVERDOWN" (agreed in kickoff meeting)

Message:
"Phoenix reports Charlie milestone complete on schedule"

Encoded:
"PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN"

Sent in Slack:
"SILVER: PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN"

Team members decode using shared key.

8. Educational Cipher Challenges

Beginner Challenges

Challenge 1: Caesar Cipher

Encrypted: WKLV LV D VHFUHW PHVVDJH
Hint: Shift is 3
Decrypt it!

Answer: THIS IS A SECRET MESSAGE

Challenge 2: Atbash

Encrypted: HXVVGH HLFGS
What does it say?

Answer: SUMMER NIGHT (H→S, X→C, etc.)

Intermediate Challenges

Challenge 3: Vigenère

Encrypted: YXPKI HS ASWZE
Keyword: LOCK
Decrypt it!

Answer: OPENS AT SEVEN

Challenge 4: Rail Fence (3 rails)

Encrypted: TETYESCESGA HEEARMSE
Decrypt it!

Answer: THE SECRET MESSAGE (written in zigzag)

Advanced Challenges

Challenge 5: Playfair

Encrypted: FD EO OA TP ED ND RP
Keyword: EXAMPLE
Decrypt it! (Remember digraph rules)

Answer: HIDDEN CHAMBER (requires Playfair decoding)

9. Cipher Selection Guide

When to Use Which Cipher

Quick & Fun (Minutes):

  • Caesar/ROT13: Casual messages, quick hiding
  • Atbash: Simple reversal
  • Pigpen: Visual fun, scavenger hunts

Moderate Security (Hours to crack):

  • Vigenère: Keyword-based secrecy
  • Polybius: Numeric encoding
  • Rail Fence: Pattern scrambling

Strong Security (Days/weeks to crack):

  • Playfair: Digraph substitution
  • Columnar Transposition: Keyword ordering
  • Double encryption: Layered methods

Maximum Security (Theoretically unbreakable):

  • One-Time Pad: True randomness + single use
  • ONLY if you can ensure truly random keys and perfect key management

Cipher Comparison Matrix

| Cipher | Strength | Speed | Key Type | Best For | |--------|----------|-------|----------|----------| | Caesar | ⭐ | Fast | Number | Kids, quick | | Atbash | ⭐ | Fast | None | Reversal | | Pigpen | ⭐⭐ | Medium | Pattern | Visual | | Vigenère | ⭐⭐⭐ | Medium | Keyword | Shared secrets | | Polybius | ⭐⭐ | Medium | Grid | Numbers | | Rail Fence | ⭐⭐ | Medium | Number | Scrambling | | Playfair | ⭐⭐⭐⭐ | Slow | Keyword | Strong encryption | | OTP | ⭐⭐⭐⭐⭐ | Medium | Random | Maximum security | | Hybrid | ⭐⭐⭐⭐ | Slow | Multiple | Layered protection |


10. Important Security Notes

What SecretCodex IS:

✅ Educational cryptography tool ✅ Fun way to learn cipher techniques ✅ Practical for casual secret messages ✅ Great for games, puzzles, scavenger hunts ✅ Introduction to key management concepts

What SecretCodex IS NOT:

❌ Not a replacement for modern encryption (AES, RSA, etc.) ❌ Not suitable for truly sensitive data (use proper encryption software) ❌ Not protection against determined adversaries ❌ Not a substitute for secure communication platforms

When to Use Proper Encryption:

  • Financial information
  • Personal identification data
  • Medical records
  • Legal documents
  • Business secrets
  • Anything truly confidential

For those use cases: Use AES-256, RSA, or encrypted messaging apps (Signal, WhatsApp, etc.)

SecretCodex is for:

  • Learning cryptography
  • Fun secret messages
  • Casual privacy
  • Educational purposes
  • Nostalgia and enjoyment

When to Use This Skill

Use SecretCodex when you want to:

  • Generate creative code names for operations/teams/locations
  • Encode a secret message to a friend or family member
  • Decode a message someone sent you (if you have the key)
  • Learn how different ciphers work
  • Create puzzle challenges or scavenger hunts
  • Add mystery to games or role-playing
  • Practice cryptographic thinking
  • Have nostalgic decoder ring fun with modern sophistication

Remember: The strength of encryption isn't just the algorithm—it's the key. Protect your keys, share them wisely, and change them often!

🔐 "In cryptography, we trust... but only with good key management!" 🔐

API & Reliability

Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.

MissingCLAWHUB

Machine interfaces

Contract & API

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/snapshot"
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract"
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust"

Operational fit

Reliability & Benchmarks

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Machine Appendix

Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.

MissingCLAWHUB

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "CLAWHUB",
      "generatedAt": "2026-04-17T02:16:49.351Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "read",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "be",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "manage",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "ensure",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:read|supported|profile capability:be|supported|profile capability:manage|supported|profile capability:ensure|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Openclaw",
    "href": "https://github.com/openclaw/skills/tree/main/skills/akhmittra/secretcodex",
    "sourceUrl": "https://github.com/openclaw/skills/tree/main/skills/akhmittra/secretcodex",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T00:45:39.800Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T00:45:39.800Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to secretcodex and adjacent AI workflows.