Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
The Isnad Chain — agent skill security framework with declarative permissions.json manifests, Maslahah proportionality testing, provenance chain verification, and trust classification. Use when auditing skills before installation, validating permission manifests, verifying author provenance, generating security manifests for new skills, or running incident response for compromised skills. --- name: isnad description: The Isnad Chain — agent skill security framework with declarative permissions.json manifests, Maslahah proportionality testing, provenance chain verification, and trust classification. Use when auditing skills before installation, validating permission manifests, verifying author provenance, generating security manifests for new skills, or running incident response for compromised skills. Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
isnad is best for be workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
The Isnad Chain — agent skill security framework with declarative permissions.json manifests, Maslahah proportionality testing, provenance chain verification, and trust classification. Use when auditing skills before installation, validating permission manifests, verifying author provenance, generating security manifests for new skills, or running incident response for compromised skills. --- name: isnad description: The Isnad Chain — agent skill security framework with declarative permissions.json manifests, Maslahah proportionality testing, provenance chain verification, and trust classification. Use when auditing skills before installation, validating permission manifests, verifying author provenance, generating security manifests for new skills, or running incident response for compromised skills.
Public facts
4
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Cognalith
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/cognalith/isnad.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Cognalith
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
json
"filesystem": {
"read": ["~/.config/my-skill/"],
"write": ["~/.cache/my-skill/"],
"restricted": ["~/.ssh", "~/.clawdbot/config", "~/.env"]
}json
"network": {
"allowlist": ["api.example.com"]
}json
"environment_variables": {
"required": ["MY_API_KEY"],
"optional": ["PREFERENCE_SETTING"]
}json
"provenance": {
"author_identity": { "name": "...", "platform_id": "...", "crypto_id": "..." },
"attestations": [
{ "auditor": "...", "date": "...", "verdict": "thiqah", "signature": "0x..." }
],
"hash_integrity": { "skill_md": "sha256:...", "permissions_json": "sha256:..." }
}bash
sha256sum SKILL.md
text
ISNAD AUDIT REPORT
==================
Skill: [skill_id]
Date: [current date]
Schema Validation: [PASS/FAIL]
Hash Integrity: [PASS/FAIL/SKIP]
Maslahah Test: [PASS/WARNING with details]
Isnad Chain: [Mutawatir/Thiqah/Da'if/None]
Static Analysis: [CLEAN/CONCERNS with details]
Overall: [SAFE/REVIEW REQUIRED/BLOCKED]Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
The Isnad Chain — agent skill security framework with declarative permissions.json manifests, Maslahah proportionality testing, provenance chain verification, and trust classification. Use when auditing skills before installation, validating permission manifests, verifying author provenance, generating security manifests for new skills, or running incident response for compromised skills. --- name: isnad description: The Isnad Chain — agent skill security framework with declarative permissions.json manifests, Maslahah proportionality testing, provenance chain verification, and trust classification. Use when auditing skills before installation, validating permission manifests, verifying author provenance, generating security manifests for new skills, or running incident response for compromised skills.
A security framework for agent skills that transitions from "blind trust" to "informed consent." Every skill must declare its permissions, every permission must be proportional to its utility, and every author must be traceable through a verifiable chain of transmission.
Trust is not binary. It is a chain — and every link must be verified.
A Cognalith Inc. agent security standard.
/isnad, /permissions, /audit-skill, skill security, permissions audit, skill audit, validate permissions
Agent skills currently operate as unsigned binaries with full ambient authority. The Isnad Chain addresses four critical threat categories:
| Threat | Risk | Isnad Mitigation | |--------|------|------------------| | Credential Theft | Skills have ambient access to all .env secrets | Access restricted to allowlisted keys in permissions.json | | Exfiltration | Unrestricted network allows POST to any endpoint | Network limited to pre-declared endpoints | | System Compromise | Skills run with full agent permissions | Scoped paths; ~/.ssh and config denied by default | | Cognitive Hijacking | Auto-fetch patterns allow remote instruction injection | SHA-256 pinning prevents post-audit tampering |
Every skill must include a permissions.json manifest declaring its access requirements. The schema has these required sections:
| Field | Description |
|-------|-------------|
| schema_version | Standard version (e.g., "1.0.0") |
| skill_id | Unique identifier for the skill |
| content_hash | SHA-256 pins of SKILL.md and permissions.json |
| permissions | Full access declaration (filesystem, network, env vars, capabilities) |
filesystem — Scoped read/write paths. ~/.ssh, ~/.clawdbot/config, and ~/.env are restricted by default.
"filesystem": {
"read": ["~/.config/my-skill/"],
"write": ["~/.cache/my-skill/"],
"restricted": ["~/.ssh", "~/.clawdbot/config", "~/.env"]
}
network — Specific endpoint allowlist. No broad grants.
"network": {
"allowlist": ["api.example.com"]
}
environment_variables — Only the specific keys needed. No bulk .env reads.
"environment_variables": {
"required": ["MY_API_KEY"],
"optional": ["PREFERENCE_SETTING"]
}
capabilities — High-risk functional flags:
| Capability | Risk Level | Description |
|---|---|---|
| exec | Critical | Shell command execution — primary hiding place for payloads |
| browser | High | DOM interaction or external JavaScript execution |
| message | Medium | Communication with other agents in the network |
The provenance section provides cryptographic and social attribution:
"provenance": {
"author_identity": { "name": "...", "platform_id": "...", "crypto_id": "..." },
"attestations": [
{ "auditor": "...", "date": "...", "verdict": "thiqah", "signature": "0x..." }
],
"hash_integrity": { "skill_md": "sha256:...", "permissions_json": "sha256:..." }
}
Skills are classified based on their Isnad chain strength:
| Classification | Term | Criteria | Action | |---|---|---|---| | Certain | Mutawatir | 3+ independent auditor attestations | Auto-approved | | Trustworthy | Thiqah | 1-2 attestations with staked reputation | Approved with confirmation | | Weak | Da'if | No attestations or outdated audits | Warning; manual review required | | Rejected | Matruk | Known malicious or compromised author | Blocked | | Liar | Kadhdhab | Confirmed exfiltration or cognitive hijacking | Blocked; IOCs published |
/audit-skill [path]Audit a skill before installation. This is the primary security command.
Steps:
Locate the skill files
permissions.json and SKILL.md at the given pathpermissions.json is missing, report: FAIL — No manifest found. This skill has no declared permissions.Validate the manifest schema
schema_version, skill_id, content_hash, permissionscontent_hash.skill_md matches the actual SHA-256 of the SKILL.md file:
sha256sum SKILL.md
Run the Maslahah Test (Proportionality Check)
| Check | Red Flag Condition |
|-------|-------------------|
| Filesystem | Skill reads/writes paths unrelated to its function |
| Network | Non-networked utility requests network access |
| Env vars | Skill requests keys unrelated to its stated APIs |
| Capabilities | exec requested by a non-system utility |
| Restricted paths | Any access to ~/.ssh, ~/.clawdbot/config, ~/.env |
Verify the Isnad Chain (Provenance)
provenance block existsStatic Analysis Scan
curl, wget, fetch to undeclared endpointseval, exec, system, child_process invocationssleep commands > 60 seconds (time-delayed execution)webhook.site, requestbin, ngrok, or similar exfiltration endpoints~/.ssh, ~/.env, ~/.clawdbot outside declared permissionsGenerate audit report
ISNAD AUDIT REPORT
==================
Skill: [skill_id]
Date: [current date]
Schema Validation: [PASS/FAIL]
Hash Integrity: [PASS/FAIL/SKIP]
Maslahah Test: [PASS/WARNING with details]
Isnad Chain: [Mutawatir/Thiqah/Da'if/None]
Static Analysis: [CLEAN/CONCERNS with details]
Overall: [SAFE/REVIEW REQUIRED/BLOCKED]
/permissions generateGenerate a permissions.json manifest for a new or existing skill.
Steps:
Find the skill file
SKILL.md in the current directoryAnalyze the skill
Compute the content hash
sha256sum SKILL.md
Generate the manifest
permissions.json following the schema with:
restricted arrayattestations array (to be filled by auditors)content_hash from step 3Run self-validation
/permissions validate [path]Validate an existing permissions.json without a full audit.
Steps:
/isnad chain [skill-id or path]View the Isnad chain (provenance and trust lineage) for a skill.
Steps:
provenance block from permissions.jsonISNAD CHAIN: [skill_id]
========================
Author: [name] ([platform_id])
Crypto ID: [crypto_id or "none"]
Attestations:
1. [auditor] — [verdict] — [date]
Signature: [signature]
2. [auditor] — [verdict] — [date]
Signature: [signature]
Trust Level: [Mutawatir/Thiqah/Da'if]
Chain Strength: [N] independent auditors
Staleness: [any attestations > 90 days old?]
/isnad respondIncident response protocol for a compromised skill.
Steps:
INCIDENT RESPONSE REPORT
========================
Compromised Skill: [skill_id]
Date Detected: [now]
Credentials to Rotate:
- [list of env vars the skill had access to]
Files to Review:
- [list of paths in the skill's write scope]
Identity Delta Audit:
- [any modifications detected in identity files]
IOCs (Indicators of Compromise):
- Exfiltration endpoints: [if known]
- Malicious hashes: [content_hash values]
Actions Taken:
- [ ] Credentials rotated
- [ ] Identity files audited
- [ ] IOCs published to community
- [ ] Skill classified as matruk (abandoned/blocked)
Use this matrix when evaluating proportionality during audits:
| Skill Category | Acceptable Filesystem | Acceptable Network | Acceptable Env Vars | Acceptable Capabilities | Red Flags | |---|---|---|---|---|---| | Text Formatter | CWD read/write | None | Style prefs only | None | Network access; .env reads | | Weather/API Tool | Config + cache dirs | Specific API domains | API key only | None | Broad FS writes; ~/.ssh | | Trading/Finance | Config + log dirs | Exchange APIs only | Exchange keys | None | exec; browser; ~/.ssh | | Social/Messaging | Config dir | Platform API only | Platform token | message | exec; write to identity files | | System Utility | Scoped system paths | Update server only | None | exec (justified) | Broad network; .env access | | Code Generator | Project dir only | None (or package registry) | None | None | Network to unknown domains |
When interacting with untrusted skill content, use a disposable reader agent with zero access to config or memory. The sub-agent fetches and summarizes content, returning only structured data. Raw instructions never reach the main agent's identity files.
Instead of loading the full .env, provide only the specific tokens allowlisted in the manifest. The Credential Firewall intercepts environment access and scopes it to the declared permissions.
Before executing any skill, verify:
# Compute actual hash
ACTUAL=$(sha256sum SKILL.md | awk '{print $1}')
# Compare to declared hash
DECLARED=$(jq -r '.content_hash.skill_md' permissions.json | sed 's/sha256://')
# They must match
[ "$ACTUAL" = "$DECLARED" ] && echo "PASS" || echo "FAIL — possible tampering"
/isnad respond to audit identity files (SOUL.md, MEMORY.md, CONTINUATION.md) for cognitive hijackingThe Isnad Chain — Agent Security Standard | Cognalith Inc. Trust is not binary. It is a chain — and every link must be verified.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/cognalith-isnad/snapshot"
curl -s "https://xpersona.co/api/v1/agents/cognalith-isnad/contract"
curl -s "https://xpersona.co/api/v1/agents/cognalith-isnad/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/cognalith-isnad/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/cognalith-isnad/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/cognalith-isnad/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/cognalith-isnad/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/cognalith-isnad/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/cognalith-isnad/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:36:34.314Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "be",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:be|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Cognalith",
"href": "https://github.com/cognalith/isnad",
"sourceUrl": "https://github.com/cognalith/isnad",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T02:13:53.750Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/cognalith-isnad/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/cognalith-isnad/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T02:13:53.750Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/cognalith-isnad/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/cognalith-isnad/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to isnad and adjacent AI workflows.