Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Xpersona Agent
Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog). --- name: researchvault description: "Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog)." homepage: https://github.com/lraivisto/ResearchVault disable-model-invocation: true user-invocable: true metadata: openclaw: emoji: "馃" requires: python: ">=3.13" env: RESEARCHVAULT_DB: description: "Optional: Custom path to the SQLite database file." required:
git clone https://github.com/lraivisto/ResearchVault.gitOverall rank
#39
Adoption
No public adoption signal
Trust
Unknown
Freshness
Mar 1, 2026
Freshness
Last checked Mar 1, 2026
Best For
researchvault is best for general automation workflows where MCP and OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.
Overview
Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog). --- name: researchvault description: "Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog)." homepage: https://github.com/lraivisto/ResearchVault disable-model-invocation: true user-invocable: true metadata: openclaw: emoji: "馃" requires: python: ">=3.13" env: RESEARCHVAULT_DB: description: "Optional: Custom path to the SQLite database file." required: Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
MCP, OpenClaw
Freshness
Mar 1, 2026
Vendor
Lraivisto
Artifacts
0
Benchmarks
0
Last release
Unpublished
Install & run
git clone https://github.com/lraivisto/ResearchVault.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.
Public facts
Vendor
Lraivisto
Protocol compatibility
MCP, OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.
Captured outputs
Extracted files
0
Examples
4
Snippets
0
Languages
typescript
Parameters
bash
python3 -m venv .venv source .venv/bin/activate pip install -e .
bash
PROJECT_ID="ops-demo" python scripts/vault.py init \ --id "$PROJECT_ID" \ --name "Ops Demo" \ --objective "Track AI agent changes" python scripts/vault.py scuttle "https://example.com" --id "$PROJECT_ID" python scripts/vault.py list python scripts/vault.py strategy --id "$PROJECT_ID"
bash
./start_portal.sh
bash
./start_portal.sh --status ./start_portal.sh --stop
Editorial read
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog). --- name: researchvault description: "Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog)." homepage: https://github.com/lraivisto/ResearchVault disable-model-invocation: true user-invocable: true metadata: openclaw: emoji: "馃" requires: python: ">=3.13" env: RESEARCHVAULT_DB: description: "Optional: Custom path to the SQLite database file." required:
ResearchVault is a local-first research operations toolkit: a CLI for ingestion/search/verification/synthesis plus an optional local portal UI. It is designed for explicit operator control: manual start, local state, and predictable defaults.
| Task | Command / Action | Notes |
|---|---|---|
| Create project | python scripts/vault.py init --id "ops-demo" --name "Ops Demo" --objective "Track AI agent changes" | Creates the project in the local SQLite vault. |
| Ingest URL | python scripts/vault.py scuttle "https://example.com" --id "ops-demo" | SSRF guard is default-deny. Use --allow-private-networks only when intentional. |
| Search | python scripts/vault.py search --query "agent benchmark updates" --format rich | Uses configured providers from env; quality depends on provider keys/base URL. |
| Strategy | python scripts/vault.py strategy --id "ops-demo" | Produces next-best-action guidance from current project state. |
| Verify | python scripts/vault.py verify plan --id "ops-demo" && python scripts/vault.py verify run --id "ops-demo" --limit 5 | Plans and executes verification missions from low-confidence findings. |
| Synthesize / Graph | python scripts/vault.py synthesize --id "ops-demo" | Builds links between findings/artifacts; inspect graph in the Portal Graph view. |
| Export | python scripts/vault.py export --id "ops-demo" --format markdown --output ~/.researchvault/ops-demo.md | Export path must be under ~/.researchvault (or test temp paths). |
| Start portal | ./start_portal.sh | Backend defaults to 127.0.0.1:8000; frontend to 127.0.0.1:5173. |
| Stop portal | ./start_portal.sh --stop | Stops backend and frontend processes started by script. |
| Portal status | ./start_portal.sh --status | Shows process/health status and UI reachability. |
~/.researchvault/research_vault.db).scripts.vault subprocesses; it is a controlled shell over the CLI.start_portal.sh loads or generates .portal_auth, exports RESEARCHVAULT_PORTAL_TOKEN, and keeps .portal_auth at chmod 600.--allow-private-networks (Portal toggle maps to this behavior).RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS (default ~/.researchvault,/tmp).~/.openclaw/workspace.BRAVE_API_KEY, SERPER_API_KEY, SEARXNG_BASE_URL); Portal does not persist/write secrets and does not inject provider secrets into vault subprocesses.disable-model-invocation: true enforces no autonomous background side effects without explicit user action.Manual install in a local virtual environment (no embedded installer actions):
python3 -m venv .venv
source .venv/bin/activate
pip install -e .
PROJECT_ID="ops-demo"
python scripts/vault.py init \
--id "$PROJECT_ID" \
--name "Ops Demo" \
--objective "Track AI agent changes"
python scripts/vault.py scuttle "https://example.com" --id "$PROJECT_ID"
python scripts/vault.py list
python scripts/vault.py strategy --id "$PROJECT_ID"
Start manually:
./start_portal.sh
Defaults:
127.0.0.1:8000127.0.0.1:5173http://127.0.0.1:5173/http://localhost:5173/Token flow:
start_portal.sh loads existing .portal_auth or generates one.RESEARCHVAULT_PORTAL_TOKEN before backend launch.#token=<token>.Operational controls:
./start_portal.sh --status
./start_portal.sh --stop
Operational notes:
RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS.--allow-private-networks.RESEARCHVAULT_DB: Override DB file path used by CLI/Portal subprocesses.RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS: Comma-separated absolute roots allowed for Portal DB selection/discovery. Default: ~/.researchvault,/tmp.RESEARCHVAULT_PORTAL_STATE_DIR: Portal state location (state.json). Default: ~/.researchvault/portal.RESEARCHVAULT_PORTAL_HOST: Backend bind host. Default: 127.0.0.1.RESEARCHVAULT_PORTAL_PORT: Backend bind port. Default: 8000.RESEARCHVAULT_PORTAL_FRONTEND_HOST: Frontend bind host. Default: 127.0.0.1.RESEARCHVAULT_PORTAL_FRONTEND_PORT: Frontend bind port. Default: 5173.RESEARCHVAULT_PORTAL_CORS_ORIGINS: Comma-separated backend CORS origins; start_portal.sh sets local frontend origins by default.RESEARCHVAULT_PORTAL_COOKIE_SECURE: Set true to mark auth cookie Secure (HTTPS deployments).RESEARCHVAULT_PORTAL_RELOAD: Backend auto-reload toggle (true by default in local dev).BRAVE_API_KEY: Brave Search API key.SERPER_API_KEY: Serper API key.SEARXNG_BASE_URL: SearXNG base URL.RESEARCHVAULT_SEARCH_PROVIDERS: Explicit provider order override.REQUESTS_CA_BUNDLE: Custom CA bundle path for HTTPS verification.SSL_CERT_FILE: Custom CA certificate file path.RESEARCHVAULT_PORTAL_PID_DIR: Portal PID/log directory used by start_portal.sh.RESEARCHVAULT_PORTAL_SHOW_TOKEN: Set 1 to print tokenized portal URLs in terminal output.RESEARCHVAULT_WATCHDOG_INGEST_TOP: Watchdog ingest top-k override.RESEARCHVAULT_VERIFY_INGEST_TOP: Verify ingest top-k override.RESEARCHVAULT_MCP_TRANSPORT: MCP transport override (default CLI transport is stdio).Symptom: Portal login returns 401 Unauthorized.
Cause: Wrong token or backend missing RESEARCHVAULT_PORTAL_TOKEN.
Fix: Restart with ./start_portal.sh, then use token from .portal_auth or #token=<token> URL hash.
Symptom: Tokenized URL does not log in.
Cause: Token mismatch, stale cookie/session, or wrong frontend host/port.
Fix: Confirm .portal_auth, clear browser cookies for the portal origin, and verify RESEARCHVAULT_PORTAL_FRONTEND_PORT/URL.
Symptom: DB rejected or cannot be selected in Portal.
Cause: DB path is outside RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS or under denied OpenClaw workspace path.
Fix: Move/use a DB under allowed roots (default ~/.researchvault,/tmp) and retry.
Symptom: Blocked host when ingesting localhost, 127.0.0.1, 169.254.*, or private RFC1918 targets.
Cause: SSRF protection default-deny blocked private/local/link-local addresses.
Fix: Only if intentional, rerun with --allow-private-networks.
Symptom: Portal fails to start because port is already in use.
Cause: Existing process is bound to backend/frontend ports.
Fix: Run ./start_portal.sh --stop, then restart; or change host/port env vars.
Symptom: vault list or portal appears empty (No projects found).
Cause: You are using a different DB path than expected.
Fix: Check RESEARCHVAULT_DB, confirm Portal current DB in diagnostics, and align to the intended file.
Symptom: Provider-backed search is not working.
Cause: Provider env vars are unset or invalid.
Fix: Set BRAVE_API_KEY and/or SERPER_API_KEY and/or SEARXNG_BASE_URL, then rerun search/verify/watchdog.
Symptom: HTTPS certificate verification failures.
Cause: Missing private CA/intermediate trust configuration.
Fix: Set REQUESTS_CA_BUNDLE or SSL_CERT_FILE to the correct CA file and retry.
Manual only; nothing auto-starts:
python scripts/services/mcp_server.pypython scripts/services/watchdog.py --onceMachine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.
Machine interfaces
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/lraivisto-researchvault/snapshot"
curl -s "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract"
curl -s "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust"
Operational fit
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/lraivisto-researchvault/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP",
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T04:44:34.442Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile protocol:OPENCLEW|unknown|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Lraivisto",
"href": "https://github.com/lraivisto/ResearchVault",
"sourceUrl": "https://github.com/lraivisto/ResearchVault",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T05:21:22.124Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP, OpenClaw",
"href": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T05:21:22.124Z",
"isPublic": true
},
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub 路 GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to researchvault and adjacent AI workflows.