Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Xpersona Agent
Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. --- name: secretcodex description: Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. metadata: openclaw: emoji: "🔐" version: "1.0.0" author: "AM" tags: ["cryp
clawhub skill install skills:akhmittra:secretcodexOverall rank
#62
Adoption
No public adoption signal
Trust
Unknown
Freshness
Feb 25, 2026
Freshness
Last checked Feb 25, 2026
Best For
secretcodex is best for read, be, manage workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, CLAWHUB, runtime-metrics, public facts pack
Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.
Overview
Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. --- name: secretcodex description: Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. metadata: openclaw: emoji: "🔐" version: "1.0.0" author: "AM" tags: ["cryp Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 25, 2026
Vendor
Openclaw
Artifacts
0
Benchmarks
0
Last release
Unpublished
Install & run
clawhub skill install skills:akhmittra:secretcodexSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.
Public facts
Vendor
Openclaw
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.
Captured outputs
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
text
CODE NAME OPTIONS: 1. Operation Silver Dawn - Silver: Premium, valuable, reflective - Dawn: New beginning, fresh start - Phonetic: SILVER DON - Use case: "Silver Dawn is go for launch" 2. Project Velocity Edge - Velocity: Speed, momentum, progress - Edge: Cutting-edge, advantage, boundary - Phonetic: vuh-LOSS-ih-tee EDJ 3. Initiative Catalyst Prime - Catalyst: Trigger change, accelerate - Prime: First-class, optimal, ready 4. Operation Horizon Shift - Horizon: Future, vision, expansion - Shift: Change, transformation 5. Project Apex Launch - Apex: Peak, highest point, summit - Launch: Beginning, deployment Recommendation: "Operation Silver Dawn" - Professional, aspirational, easy to remember and say.
text
Plaintext: MEET ME AT NOON Key: Shift 3 Ciphertext: PHHW PH DW QRRQ M → P (shift 3) E → H (shift 3) E → H (shift 3) T → W (shift 3)
text
Plaintext: SECRET MESSAGE Ciphertext: FRPERG ZRFFNTR S → F (shift 13) E → R (shift 13) ...
text
Plaintext: HIDDEN Ciphertext: SRWWVM H → S (A=Z, B=Y, ... H=S) I → R D → W D → W E → V N → M
text
# Grid 1: # Grid 2:
A|B|C J|K|L
-+-+- -+-+-
D|E|F M|N|O
-+-+- -+-+-
G|H|I P|Q|R
# X-Grid 1: # X-Grid 2:
S T W X
X X
U V Y Ztext
Plaintext: HELLO Symbols: [H][E][L][L][O] H = bottom-left of first grid E = middle of first grid L = top-right of second grid L = top-right of second grid O = middle of second grid
Editorial read
Docs source
CLAWHUB
Editorial quality
ready
Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. --- name: secretcodex description: Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties. metadata: openclaw: emoji: "🔐" version: "1.0.0" author: "AM" tags: ["cryp
SecretCodex brings back the magic of decoder rings from your childhood cereal boxes, but with the sophistication of modern cryptography. Generate creative code names for operations and team members, encode secret messages using multiple cipher methods, and decode messages from trusted contacts—all with keys that you control and share manually with intended recipients.
Perfect for:
Security through obscurity is weak. Security through strong ciphers + key management is powerful.
SecretCodex teaches you both:
Before you encode messages, you need great code names! SecretCodex generates creative, memorable names for operations, projects, or individuals.
Format: [Adjective] + [Noun]
Examples:
Generation Strategy:
Format: Single word or [Title] + [Element]
Examples:
Generation Strategy:
Format: Geographic-sounding but fictional
Examples:
User provides:
SecretCodex generates:
Example:
User: "Generate a code name for our Q1 product launch project. Tone: Exciting but professional."
SecretCodex:
CODE NAME OPTIONS:
1. Operation Silver Dawn
- Silver: Premium, valuable, reflective
- Dawn: New beginning, fresh start
- Phonetic: SILVER DON
- Use case: "Silver Dawn is go for launch"
2. Project Velocity Edge
- Velocity: Speed, momentum, progress
- Edge: Cutting-edge, advantage, boundary
- Phonetic: vuh-LOSS-ih-tee EDJ
3. Initiative Catalyst Prime
- Catalyst: Trigger change, accelerate
- Prime: First-class, optimal, ready
4. Operation Horizon Shift
- Horizon: Future, vision, expansion
- Shift: Change, transformation
5. Project Apex Launch
- Apex: Peak, highest point, summit
- Launch: Beginning, deployment
Recommendation: "Operation Silver Dawn" -
Professional, aspirational, easy to remember and say.
How it works: Shift each letter forward or backward in the alphabet by a fixed number.
Key: Shift amount (1-25)
Example:
Plaintext: MEET ME AT NOON
Key: Shift 3
Ciphertext: PHHW PH DW QRRQ
M → P (shift 3)
E → H (shift 3)
E → H (shift 3)
T → W (shift 3)
Decoding: Shift backward by the same amount.
Strength: ⭐☆☆☆☆ (Very weak - only 25 possible keys) Best for: Kids, quick messages, nostalgia
How it works: Special case of Caesar cipher with shift of 13. Encoding = Decoding (symmetric).
Key: None needed (always shift 13)
Example:
Plaintext: SECRET MESSAGE
Ciphertext: FRPERG ZRFFNTR
S → F (shift 13)
E → R (shift 13)
...
Strength: ⭐☆☆☆☆ (Very weak - single fixed key) Best for: Quick obfuscation, forum spoilers, simple hiding
How it works: Replace A with Z, B with Y, C with X, etc. (reverse alphabet)
Key: None (fixed pattern)
Example:
Plaintext: HIDDEN
Ciphertext: SRWWVM
H → S (A=Z, B=Y, ... H=S)
I → R
D → W
D → W
E → V
N → M
Strength: ⭐☆☆☆☆ (Very weak - no key variation) Best for: Quick reversal, simple codes
How it works: Replace letters with geometric symbols based on grids.
Key: Grid arrangement (standard or custom)
Grid Pattern:
# Grid 1: # Grid 2:
A|B|C J|K|L
-+-+- -+-+-
D|E|F M|N|O
-+-+- -+-+-
G|H|I P|Q|R
# X-Grid 1: # X-Grid 2:
S T W X
X X
U V Y Z
Example:
Plaintext: HELLO
Symbols: [H][E][L][L][O]
H = bottom-left of first grid
E = middle of first grid
L = top-right of second grid
L = top-right of second grid
O = middle of second grid
Strength: ⭐⭐☆☆☆ (Weak - pattern recognition) Best for: Visual encoding, kids, scavenger hunts
How it works: Letters arranged in 5×5 grid (I/J combined). Each letter = row + column.
Key: Grid arrangement (can be scrambled)
Standard Grid:
1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z
Example:
Plaintext: ATTACK
Ciphertext: 11 44 44 11 13 25
A = row 1, col 1 = 11
T = row 4, col 4 = 44
T = row 4, col 4 = 44
A = row 1, col 1 = 11
C = row 1, col 3 = 13
K = row 2, col 5 = 25
Strength: ⭐⭐☆☆☆ (Weak alone, strong when combined) Best for: Numeric encoding, combining with other methods
How it works: Like Caesar but the shift changes for each letter based on a keyword.
Key: Keyword or phrase (longer = stronger)
Example:
Plaintext: ATTACK AT DAWN
Key: SECRETSECRETSE
Ciphertext: SXVRGD SX HSAS
A + S = S (0+18 mod 26)
T + E = X (19+4 mod 26)
T + C = V (19+2 mod 26)
A + R = R (0+17 mod 26)
C + E = G (2+4 mod 26)
K + T = D (10+19 mod 26)
...
Vigenère Square (for reference):
A B C D E F ...
A | A B C D E F ...
B | B C D E F G ...
C | C D E F G H ...
... (26×26 grid)
Decoding: Use keyword to shift backward.
Strength: ⭐⭐⭐☆☆ (Moderate - strong if long keyword) Best for: Keyword-based secrecy, shared phrase keys
How it works: Write message in zigzag pattern across multiple rails, read off by rows.
Key: Number of rails (2-10)
Example with 3 rails:
Plaintext: THISISASECRET
Writing pattern (3 rails):
T . . . S . . . E . . . T Rail 1: T S E T
. H . S . I . A . S . C . E Rail 2: H S I A S C E
. . I . . . S . . . R . . Rail 3: I S R
Ciphertext: TSET HSIASECE ISR (read row by row)
Compact: TSETHSIASCEEISR
Decoding: Know number of rails, reverse the zigzag write.
Strength: ⭐⭐☆☆☆ (Weak - pattern-based) Best for: Visual rearrangement, combining with substitution
How it works: Encrypt pairs of letters using a 5×5 keyed grid. Much stronger than single-letter substitution.
Key: Keyword creates the grid
Grid Creation:
Example with keyword "MONARCHY":
M O N A R
C H Y B D
E F G I/J K
L P Q S T
U V W X Z
Encryption Rules:
Example:
Plaintext: HE LL OW OR LD (pairs)
Key: MONARCHY
HE: H=row2,col2 E=row3,col1 → Rectangle → EB
LL: L=row4,col1 L=row4,col1 → Insert X: LX → LXLX
OW: O=row1,col2 W=row5,col3 → Rectangle → AZ
OR: O=row1,col2 R=row1,col5 → Same row → NA
LD: L=row4,col1 D=row2,col5 → Rectangle → UD
Ciphertext: EB LZ OL AZ NA UD
Strength: ⭐⭐⭐⭐☆ (Strong - resists frequency analysis) Best for: Serious encoding, resisting decryption
How it works: Write message in rows, read columns in keyword-alphabetical order.
Key: Keyword determines column order
Example:
Plaintext: ATTACK AT DAWN
Key: ZEBRA (alphabetical: ABERZ = 52143)
Write in 5 columns under keyword:
Z E B R A
---------
A T T A C
K A T D A
W N X X X (padding)
Read columns in alphabetical order (A E B R Z):
Column A (5): C A X
Column E (2): T A N
Column B (3): T T X
Column R (4): A D X
Column Z (1): A K W
Ciphertext: CAXTANTТXADXAKW
Compact: CAXTANTTXADXAKW
Strength: ⭐⭐⭐☆☆ (Moderate - order is key) Best for: Scrambling message structure
How it works: Each message encrypted with truly random key, used only once, same length as message.
Key: Random string same length as plaintext (MUST be truly random, MUST be used only once)
Example:
Plaintext: HELLO
Key: XMCKL (truly random, never reused)
H + X = E (7+23 mod 26)
E + M = Q (4+12 mod 26)
L + C = N (11+2 mod 26)
L + K = V (11+10 mod 26)
O + L = Z (14+11 mod 26)
Ciphertext: EQNVZ
CRITICAL: Key must be:
Strength: ⭐⭐⭐⭐⭐ (Perfect if used correctly) Best for: Maximum security (if you can manage true randomness and single-use keys)
Method: Apply two different ciphers sequentially
Example: Vigenère + Rail Fence
Step 1: Vigenère with keyword "FORTRESS"
Plaintext: MEET ME AT THE BRIDGE
Key: FORTRESSFORTRESSFO
Result: RXJG ZR UG GUR VKWQTR
Step 2: Rail Fence with 3 rails
Input: RXJGZRUGGURVIIWQTR
Output: RJZGRTVR XGUGUKWT RI (rail-encoded)
Final Ciphertext: RJZGRTVХGUGUKWTГRI
Decoding: Reverse order (Rail Fence first, then Vigenère)
Strength: ⭐⭐⭐⭐☆ (Much stronger than either alone)
Method: Convert to numbers, then shift with keyword
Example:
Step 1: Polybius Square
Plaintext: HELLO
Numbers: 23 15 31 31 34
Step 2: Vigenère on Numbers
Key: SECRET = 18 14 12 17 14 19
Add key to numbers (mod 100):
23+18=41, 15+14=29, 31+12=43, 31+17=48, 34+14=48
Final Ciphertext: 41 29 43 48 48
Strength: ⭐⭐⭐⭐☆ (Numeric + alphabetic layers)
The most important part of cryptography: KEY MANAGEMENT
1. Shift/Rotation Keys (Simple)
2. Keyword Keys (Intermediate)
3. Random Keys (Advanced)
4. Grid/Pattern Keys (Visual)
How to share your key securely:
In-Person Exchange (Most secure)
Separate Channel (Good)
Pre-Arranged Keys (Best for ongoing)
Physical Key Exchange (Creative)
Key Security Rules:
Scenario: You need to tell your friend where and when to meet, but you're communicating in a public group chat.
Solution:
Code Names:
- You: "Phoenix"
- Friend: "Atlas"
- Meeting spot: "Raven's Point" (actually the north library entrance)
- Time: Use Vigenère
Message Setup:
Plaintext: MEET AT RAVENS POINT AT THREE PM
Cipher: Vigenère
Key: FORTRESS (shared in-person last week)
Encoding:
M+F=R, E+O=S, E+R=V, T+T=M, ...
Encrypted: RXJG UG KHEVLA UTVRM UG GLVJJ TZ
Sent Message:
"Phoenix to Atlas: RXJG UG KHEVLA UTVRM UG GLVJJ TZ"
Friend decodes using FORTRESS key → Meets you at Raven's Point (north library) at 3pm
Scenario: Creating secret clues for a treasure hunt.
Solution:
Clue 1 (Simple - Caesar Shift 5):
Plaintext: LOOK UNDER THE OAK TREE
Ciphertext: QTTP ZSIJW YMJ TPF YWJJ
Clue 2 (Medium - Rail Fence 4 rails):
Plaintext: THE TREASURE IS IN THE SHED
Ciphertext: TEUEIHHE RSRSNSDE TISHETDR
Clue 3 (Hard - Playfair with keyword HUNTER):
Plaintext: FINAL PRIZE BEHIND DOOR TWO
(Encrypted with Playfair)
Ciphertext: GHPBM QXFBH CHAKMB ENNX VVS
Each clue progressively harder, keys provided when previous clue found.
Scenario: You want to keep a journal that's private even if someone reads it.
Solution:
Method: Double Vigenère (two different keywords)
First Pass:
Plaintext: TODAY I LEARNED SOMETHING IMPORTANT
Key 1: JOURNAL
Ciphertext 1: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV
Second Pass:
Plaintext: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV
Key 2: PRIVATE
Ciphertext 2: RVPCQ G KXIGXFT SGDTHSOTZ EIAXQVYOX
Final encrypted entry goes in journal.
Only you know both keys to decrypt.
Scenario: Remote team needs to share sensitive project info.
Solution:
Code Name System:
- Project: "Operation Silver Dawn"
- Team members: Phoenix, Atlas, Cipher, Raven
- Milestones: Alpha, Bravo, Charlie, Delta
Sensitive Message Encoding:
Method: Columnar Transposition + Substitution
Key: Team keyword "SILVERDOWN" (agreed in kickoff meeting)
Message:
"Phoenix reports Charlie milestone complete on schedule"
Encoded:
"PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN"
Sent in Slack:
"SILVER: PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN"
Team members decode using shared key.
Challenge 1: Caesar Cipher
Encrypted: WKLV LV D VHFUHW PHVVDJH
Hint: Shift is 3
Decrypt it!
Answer: THIS IS A SECRET MESSAGE
Challenge 2: Atbash
Encrypted: HXVVGH HLFGS
What does it say?
Answer: SUMMER NIGHT (H→S, X→C, etc.)
Challenge 3: Vigenère
Encrypted: YXPKI HS ASWZE
Keyword: LOCK
Decrypt it!
Answer: OPENS AT SEVEN
Challenge 4: Rail Fence (3 rails)
Encrypted: TETYESCESGA HEEARMSE
Decrypt it!
Answer: THE SECRET MESSAGE (written in zigzag)
Challenge 5: Playfair
Encrypted: FD EO OA TP ED ND RP
Keyword: EXAMPLE
Decrypt it! (Remember digraph rules)
Answer: HIDDEN CHAMBER (requires Playfair decoding)
Quick & Fun (Minutes):
Moderate Security (Hours to crack):
Strong Security (Days/weeks to crack):
Maximum Security (Theoretically unbreakable):
| Cipher | Strength | Speed | Key Type | Best For | |--------|----------|-------|----------|----------| | Caesar | ⭐ | Fast | Number | Kids, quick | | Atbash | ⭐ | Fast | None | Reversal | | Pigpen | ⭐⭐ | Medium | Pattern | Visual | | Vigenère | ⭐⭐⭐ | Medium | Keyword | Shared secrets | | Polybius | ⭐⭐ | Medium | Grid | Numbers | | Rail Fence | ⭐⭐ | Medium | Number | Scrambling | | Playfair | ⭐⭐⭐⭐ | Slow | Keyword | Strong encryption | | OTP | ⭐⭐⭐⭐⭐ | Medium | Random | Maximum security | | Hybrid | ⭐⭐⭐⭐ | Slow | Multiple | Layered protection |
✅ Educational cryptography tool ✅ Fun way to learn cipher techniques ✅ Practical for casual secret messages ✅ Great for games, puzzles, scavenger hunts ✅ Introduction to key management concepts
❌ Not a replacement for modern encryption (AES, RSA, etc.) ❌ Not suitable for truly sensitive data (use proper encryption software) ❌ Not protection against determined adversaries ❌ Not a substitute for secure communication platforms
For those use cases: Use AES-256, RSA, or encrypted messaging apps (Signal, WhatsApp, etc.)
SecretCodex is for:
Use SecretCodex when you want to:
Remember: The strength of encryption isn't just the algorithm—it's the key. Protect your keys, share them wisely, and change them often!
🔐 "In cryptography, we trust... but only with good key management!" 🔐
Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.
Machine interfaces
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/snapshot"
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract"
curl -s "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust"
Operational fit
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "CLAWHUB",
"generatedAt": "2026-04-17T02:16:49.351Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "read",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "be",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "manage",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "ensure",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:read|supported|profile capability:be|supported|profile capability:manage|supported|profile capability:ensure|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Openclaw",
"href": "https://github.com/openclaw/skills/tree/main/skills/akhmittra/secretcodex",
"sourceUrl": "https://github.com/openclaw/skills/tree/main/skills/akhmittra/secretcodex",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T00:45:39.800Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T00:45:39.800Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/clawhub-skills-akhmittra-secretcodex/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to secretcodex and adjacent AI workflows.