Claim this agent
Agent DossierGITHUB OPENCLEWSafety 89/100

Xpersona Agent

researchvault

Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog). --- name: researchvault description: "Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog)." homepage: https://github.com/lraivisto/ResearchVault disable-model-invocation: true user-invocable: true metadata: openclaw: emoji: "馃" requires: python: ">=3.13" env: RESEARCHVAULT_DB: description: "Optional: Custom path to the SQLite database file." required:

MCP 路 self-declaredOpenClaw 路 self-declared
Trust evidence available
git clone https://github.com/lraivisto/ResearchVault.git

Overall rank

#39

Adoption

No public adoption signal

Trust

Unknown

Freshness

Mar 1, 2026

Freshness

Last checked Mar 1, 2026

Best For

researchvault is best for general automation workflows where MCP and OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Overview

Key links, install path, reliability highlights, and the shortest practical read before diving into the crawl record.

Verifiededitorial-content

Overview

Executive Summary

Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog). --- name: researchvault description: "Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog)." homepage: https://github.com/lraivisto/ResearchVault disable-model-invocation: true user-invocable: true metadata: openclaw: emoji: "馃" requires: python: ">=3.13" env: RESEARCHVAULT_DB: description: "Optional: Custom path to the SQLite database file." required: Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.

No verified compatibility signals

Trust score

Unknown

Compatibility

MCP, OpenClaw

Freshness

Mar 1, 2026

Vendor

Lraivisto

Artifacts

0

Benchmarks

0

Last release

Unpublished

Install & run

Setup Snapshot

git clone https://github.com/lraivisto/ResearchVault.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence & Timeline

Public facts grouped by evidence type, plus release and crawl events with provenance and freshness.

Verifiededitorial-content

Public facts

Evidence Ledger

Vendor (1)

Vendor

Lraivisto

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

MCP, OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Artifacts & Docs

Parameters, dependencies, examples, extracted files, editorial overview, and the complete README when available.

Self-declaredGITHUB OPENCLEW

Captured outputs

Artifacts Archive

Extracted files

0

Examples

4

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

python3 -m venv .venv
source .venv/bin/activate
pip install -e .

bash

PROJECT_ID="ops-demo"

python scripts/vault.py init \
  --id "$PROJECT_ID" \
  --name "Ops Demo" \
  --objective "Track AI agent changes"

python scripts/vault.py scuttle "https://example.com" --id "$PROJECT_ID"
python scripts/vault.py list
python scripts/vault.py strategy --id "$PROJECT_ID"

bash

./start_portal.sh

bash

./start_portal.sh --status
./start_portal.sh --stop

Editorial read

Docs & README

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog). --- name: researchvault description: "Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog)." homepage: https://github.com/lraivisto/ResearchVault disable-model-invocation: true user-invocable: true metadata: openclaw: emoji: "馃" requires: python: ">=3.13" env: RESEARCHVAULT_DB: description: "Optional: Custom path to the SQLite database file." required:

Full README

name: researchvault description: "Local-first research orchestration engine. Manages state, synthesis, and optional background services (MCP/Watchdog)." homepage: https://github.com/lraivisto/ResearchVault disable-model-invocation: true user-invocable: true metadata: openclaw: emoji: "馃" requires: python: ">=3.13" env: RESEARCHVAULT_DB: description: "Optional: Custom path to the SQLite database file." required: false BRAVE_API_KEY: description: "Optional: Brave Search API key." required: false SERPER_API_KEY: description: "Optional: Serper API key." required: false SEARXNG_BASE_URL: description: "Optional: SearXNG base URL." required: false RESEARCHVAULT_PORTAL_TOKEN: description: "Optional: static portal token. If unset, start_portal.sh sources/generates .portal_auth and exports this env var." required: false RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS: description: "Optional: comma-separated absolute DB roots. Default: ~/.researchvault,/tmp." required: false RESEARCHVAULT_PORTAL_STATE_DIR: description: "Optional: portal state directory (default ~/.researchvault/portal)." required: false RESEARCHVAULT_PORTAL_HOST: description: "Optional: backend bind host." required: false RESEARCHVAULT_PORTAL_PORT: description: "Optional: backend bind port." required: false RESEARCHVAULT_PORTAL_FRONTEND_HOST: description: "Optional: frontend bind host." required: false RESEARCHVAULT_PORTAL_FRONTEND_PORT: description: "Optional: frontend bind port." required: false RESEARCHVAULT_PORTAL_CORS_ORIGINS: description: "Optional: comma-separated CORS origins for backend." required: false RESEARCHVAULT_PORTAL_RELOAD: description: "Optional: set to 'true' for backend auto-reload." required: false RESEARCHVAULT_PORTAL_COOKIE_SECURE: description: "Optional: set to 'true' to mark auth cookie Secure." required: false RESEARCHVAULT_PORTAL_PID_DIR: description: "Optional: start_portal.sh PID/log directory." required: false RESEARCHVAULT_PORTAL_SHOW_TOKEN: description: "Optional: set to '1' to print tokenized portal URLs." required: false RESEARCHVAULT_SEARCH_PROVIDERS: description: "Optional: search provider order override." required: false RESEARCHVAULT_WATCHDOG_INGEST_TOP: description: "Optional: watchdog ingest top-k override." required: false RESEARCHVAULT_VERIFY_INGEST_TOP: description: "Optional: verify ingest top-k override." required: false RESEARCHVAULT_MCP_TRANSPORT: description: "Optional: MCP server transport override." required: false REQUESTS_CA_BUNDLE: description: "Optional: custom CA bundle for HTTPS verification." required: false SSL_CERT_FILE: description: "Optional: custom CA certificate file." required: false

ResearchVault 馃

ResearchVault is a local-first research operations toolkit: a CLI for ingestion/search/verification/synthesis plus an optional local portal UI. It is designed for explicit operator control: manual start, local state, and predictable defaults.

Quick Reference

| Task | Command / Action | Notes | |---|---|---| | Create project | python scripts/vault.py init --id "ops-demo" --name "Ops Demo" --objective "Track AI agent changes" | Creates the project in the local SQLite vault. | | Ingest URL | python scripts/vault.py scuttle "https://example.com" --id "ops-demo" | SSRF guard is default-deny. Use --allow-private-networks only when intentional. | | Search | python scripts/vault.py search --query "agent benchmark updates" --format rich | Uses configured providers from env; quality depends on provider keys/base URL. | | Strategy | python scripts/vault.py strategy --id "ops-demo" | Produces next-best-action guidance from current project state. | | Verify | python scripts/vault.py verify plan --id "ops-demo" && python scripts/vault.py verify run --id "ops-demo" --limit 5 | Plans and executes verification missions from low-confidence findings. | | Synthesize / Graph | python scripts/vault.py synthesize --id "ops-demo" | Builds links between findings/artifacts; inspect graph in the Portal Graph view. | | Export | python scripts/vault.py export --id "ops-demo" --format markdown --output ~/.researchvault/ops-demo.md | Export path must be under ~/.researchvault (or test temp paths). | | Start portal | ./start_portal.sh | Backend defaults to 127.0.0.1:8000; frontend to 127.0.0.1:5173. | | Stop portal | ./start_portal.sh --stop | Stops backend and frontend processes started by script. | | Portal status | ./start_portal.sh --status | Shows process/health status and UI reachability. |

Trust Model / Security Notes

  • Local-first by default: data is stored in a local SQLite DB (default ~/.researchvault/research_vault.db).
  • Portal is local by default: backend/frontend bind loopback addresses unless you explicitly override host vars.
  • Portal execution model: the backend runs scripts.vault subprocesses; it is a controlled shell over the CLI.
  • Portal auth token is required: start_portal.sh loads or generates .portal_auth, exports RESEARCHVAULT_PORTAL_TOKEN, and keeps .portal_auth at chmod 600.
  • SSRF posture is default-deny for local/private/link-local targets; private-network access is explicit opt-in via CLI --allow-private-networks (Portal toggle maps to this behavior).
  • DB selection is root-scoped by RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS (default ~/.researchvault,/tmp).
  • Portal does not discover or allow selecting DBs under ~/.openclaw/workspace.
  • Provider secrets are env-only (BRAVE_API_KEY, SERPER_API_KEY, SEARXNG_BASE_URL); Portal does not persist/write secrets and does not inject provider secrets into vault subprocesses.
  • disable-model-invocation: true enforces no autonomous background side effects without explicit user action.

Installation (Manual, Local)

Manual install in a local virtual environment (no embedded installer actions):

python3 -m venv .venv
source .venv/bin/activate
pip install -e .

CLI Quick Start

PROJECT_ID="ops-demo"

python scripts/vault.py init \
  --id "$PROJECT_ID" \
  --name "Ops Demo" \
  --objective "Track AI agent changes"

python scripts/vault.py scuttle "https://example.com" --id "$PROJECT_ID"
python scripts/vault.py list
python scripts/vault.py strategy --id "$PROJECT_ID"

Portal (Manual Opt-In)

Start manually:

./start_portal.sh

Defaults:

  • Backend: 127.0.0.1:8000
  • Frontend: 127.0.0.1:5173
  • Login pages:
    • http://127.0.0.1:5173/
    • http://localhost:5173/

Token flow:

  • start_portal.sh loads existing .portal_auth or generates one.
  • It exports RESEARCHVAULT_PORTAL_TOKEN before backend launch.
  • UI login accepts manual token entry or token URL hash: #token=<token>.

Operational controls:

./start_portal.sh --status
./start_portal.sh --stop

Operational notes:

  • Portal expects local use and local DB roots.
  • DB access is constrained by RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS.
  • OpenClaw workspace DB paths are intentionally excluded.
  • Portal private-network ingest toggle maps to CLI --allow-private-networks.

Configuration

Database

  • RESEARCHVAULT_DB: Override DB file path used by CLI/Portal subprocesses.
  • RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS: Comma-separated absolute roots allowed for Portal DB selection/discovery. Default: ~/.researchvault,/tmp.
  • RESEARCHVAULT_PORTAL_STATE_DIR: Portal state location (state.json). Default: ~/.researchvault/portal.

Portal Networking

  • RESEARCHVAULT_PORTAL_HOST: Backend bind host. Default: 127.0.0.1.
  • RESEARCHVAULT_PORTAL_PORT: Backend bind port. Default: 8000.
  • RESEARCHVAULT_PORTAL_FRONTEND_HOST: Frontend bind host. Default: 127.0.0.1.
  • RESEARCHVAULT_PORTAL_FRONTEND_PORT: Frontend bind port. Default: 5173.
  • RESEARCHVAULT_PORTAL_CORS_ORIGINS: Comma-separated backend CORS origins; start_portal.sh sets local frontend origins by default.
  • RESEARCHVAULT_PORTAL_COOKIE_SECURE: Set true to mark auth cookie Secure (HTTPS deployments).
  • RESEARCHVAULT_PORTAL_RELOAD: Backend auto-reload toggle (true by default in local dev).

Providers

  • BRAVE_API_KEY: Brave Search API key.
  • SERPER_API_KEY: Serper API key.
  • SEARXNG_BASE_URL: SearXNG base URL.
  • RESEARCHVAULT_SEARCH_PROVIDERS: Explicit provider order override.

TLS / CA

  • REQUESTS_CA_BUNDLE: Custom CA bundle path for HTTPS verification.
  • SSL_CERT_FILE: Custom CA certificate file path.

Advanced / Rare

  • RESEARCHVAULT_PORTAL_PID_DIR: Portal PID/log directory used by start_portal.sh.
  • RESEARCHVAULT_PORTAL_SHOW_TOKEN: Set 1 to print tokenized portal URLs in terminal output.
  • RESEARCHVAULT_WATCHDOG_INGEST_TOP: Watchdog ingest top-k override.
  • RESEARCHVAULT_VERIFY_INGEST_TOP: Verify ingest top-k override.
  • RESEARCHVAULT_MCP_TRANSPORT: MCP transport override (default CLI transport is stdio).

Troubleshooting

  • Symptom: Portal login returns 401 Unauthorized. Cause: Wrong token or backend missing RESEARCHVAULT_PORTAL_TOKEN. Fix: Restart with ./start_portal.sh, then use token from .portal_auth or #token=<token> URL hash.

  • Symptom: Tokenized URL does not log in. Cause: Token mismatch, stale cookie/session, or wrong frontend host/port. Fix: Confirm .portal_auth, clear browser cookies for the portal origin, and verify RESEARCHVAULT_PORTAL_FRONTEND_PORT/URL.

  • Symptom: DB rejected or cannot be selected in Portal. Cause: DB path is outside RESEARCHVAULT_PORTAL_ALLOWED_DB_ROOTS or under denied OpenClaw workspace path. Fix: Move/use a DB under allowed roots (default ~/.researchvault,/tmp) and retry.

  • Symptom: Blocked host when ingesting localhost, 127.0.0.1, 169.254.*, or private RFC1918 targets. Cause: SSRF protection default-deny blocked private/local/link-local addresses. Fix: Only if intentional, rerun with --allow-private-networks.

  • Symptom: Portal fails to start because port is already in use. Cause: Existing process is bound to backend/frontend ports. Fix: Run ./start_portal.sh --stop, then restart; or change host/port env vars.

  • Symptom: vault list or portal appears empty (No projects found). Cause: You are using a different DB path than expected. Fix: Check RESEARCHVAULT_DB, confirm Portal current DB in diagnostics, and align to the intended file.

  • Symptom: Provider-backed search is not working. Cause: Provider env vars are unset or invalid. Fix: Set BRAVE_API_KEY and/or SERPER_API_KEY and/or SEARXNG_BASE_URL, then rerun search/verify/watchdog.

  • Symptom: HTTPS certificate verification failures. Cause: Missing private CA/intermediate trust configuration. Fix: Set REQUESTS_CA_BUNDLE or SSL_CERT_FILE to the correct CA file and retry.

Optional Services (Manual Start)

Manual only; nothing auto-starts:

  • MCP Server: python scripts/services/mcp_server.py
  • Watchdog: python scripts/services/watchdog.py --once

Provenance

API & Reliability

Machine endpoints, contract coverage, trust signals, runtime metrics, benchmarks, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Machine interfaces

Contract & API

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

MCP: self-declaredOpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/lraivisto-researchvault/snapshot"
curl -s "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract"
curl -s "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust"

Operational fit

Reliability & Benchmarks

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Machine Appendix

Raw contract, invocation, trust, capability, facts, and change-event payloads for machine-side inspection.

MissingGITHUB OPENCLEW

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/lraivisto-researchvault/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "MCP",
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T04:44:34.442Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "MCP",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    }
  ],
  "flattenedTokens": "protocol:MCP|unknown|profile protocol:OPENCLEW|unknown|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Lraivisto",
    "href": "https://github.com/lraivisto/ResearchVault",
    "sourceUrl": "https://github.com/lraivisto/ResearchVault",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "MCP, OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:21:22.124Z",
    "isPublic": true
  },
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/lraivisto-researchvault/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub 路 GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to researchvault and adjacent AI workflows.