Crawler Summary

Agent-ID answer-first brief

Verifiable identity for every AI agent | lightweight, open-source, works with LangChain/CrewAI/AutoGen AgentID **Verifiable identity for every AI agent.** $1 $1 Built by $1 --- Every production AI agent today either shares human credentials (dangerous) or runs with no identity, no audit trail, and no scoped permissions. AgentID fixes this. AgentID is a **lightweight, open-source identity provider + audit service + SDKs** that gives every AI agent its own verifiable identity, short-lived scoped credentials, and automat Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.

Freshness

Last checked 4/15/2026

Best For

Agent-ID is best for crewai, multi-agent workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB REPOS, runtime-metrics, public facts pack

Claim this agent
Agent DossierGITHUB REPOSSafety: 66/100

Agent-ID

Verifiable identity for every AI agent | lightweight, open-source, works with LangChain/CrewAI/AutoGen AgentID **Verifiable identity for every AI agent.** $1 $1 Built by $1 --- Every production AI agent today either shares human credentials (dangerous) or runs with no identity, no audit trail, and no scoped permissions. AgentID fixes this. AgentID is a **lightweight, open-source identity provider + audit service + SDKs** that gives every AI agent its own verifiable identity, short-lived scoped credentials, and automat

OpenClawself-declared

Public facts

5

Change events

1

Artifacts

0

Freshness

Apr 15, 2026

Verifiededitorial-contentNo verified compatibility signals2 GitHub stars

Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.

2 GitHub starsTrust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Apr 15, 2026

Vendor

Pedroshakoor

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.

Setup snapshot

  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Pedroshakoor

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Adoption (1)

Adoption signal

2 GitHub stars

profilemedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB REPOS

Extracted files

0

Examples

6

Snippets

0

Languages

python

Executable Examples

bash

git clone https://github.com/Pedroshakoor/Agent-ID
cd Agent-ID
make dev   # starts backend + frontend + postgres + redis via Docker Compose

bash

curl -X POST http://localhost:8000/v1/agents \
  -H "Content-Type: application/json" \
  -d '{"name": "my-agent", "owner_id": "user-123"}'

bash

curl -X POST http://localhost:8000/v1/agents \
  -H "Content-Type: application/json" \
  -d '{"name": "my-agent", "owner_id": "user-123"}'
# → { "id": "...", "api_key": "agid_..." }

python

pip install agentid

python

from agentid import AgentIDClient

async with AgentIDClient(
    base_url="http://localhost:8000",
    agent_id="your-agent-id",
    api_key="agid_your_key",
) as client:
    token = await client.get_token()           # short-lived RS256 JWT
    await client.log_action(                   # audit every action
        action="email:send",
        resource="user@example.com",
        result="allowed",
    )
    allowed, reason = await client.verify(     # check policy before acting
        "email:send", "user@example.com"
    )

bash

npm install @agentid/sdk

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB REPOS

Docs source

GITHUB REPOS

Editorial quality

ready

Verifiable identity for every AI agent | lightweight, open-source, works with LangChain/CrewAI/AutoGen AgentID **Verifiable identity for every AI agent.** $1 $1 Built by $1 --- Every production AI agent today either shares human credentials (dangerous) or runs with no identity, no audit trail, and no scoped permissions. AgentID fixes this. AgentID is a **lightweight, open-source identity provider + audit service + SDKs** that gives every AI agent its own verifiable identity, short-lived scoped credentials, and automat

Full README

AgentID

Verifiable identity for every AI agent.

License: MIT Twitter

Built by @pedroshakoor


Every production AI agent today either shares human credentials (dangerous) or runs with no identity, no audit trail, and no scoped permissions. AgentID fixes this.

AgentID is a lightweight, open-source identity provider + audit service + SDKs that gives every AI agent its own verifiable identity, short-lived scoped credentials, and automatic action logging — without ever using human credentials.

Works with LangChain, LangGraph, CrewAI, AutoGen, OpenAI Agents, LlamaIndex — or any custom agent.


Why AgentID

Research from Strata, Teleport, and Cisco (March 2026) consistently identifies "unmanaged agent identities" as the #1 enterprise blocker for AI adoption:

  • Agents share human OAuth tokens → impossible to audit, impossible to revoke
  • No scoped permissions → an agent with email access can send anything to anyone
  • No audit trail → no way to know what an agent did or why
  • No standard → every team invents their own (insecure) solution

AgentID solves this in 5 lines of code.


Quickstart

1. Start the server

git clone https://github.com/Pedroshakoor/Agent-ID
cd Agent-ID
make dev   # starts backend + frontend + postgres + redis via Docker Compose

Dashboard: http://localhost:3000 · API docs: http://localhost:8000/docs

2. Register your agent

curl -X POST http://localhost:8000/v1/agents \
  -H "Content-Type: application/json" \
  -d '{"name": "my-agent", "owner_id": "user-123"}'
# → { "id": "...", "api_key": "agid_..." }

3. Use the SDK

Python:

pip install agentid
from agentid import AgentIDClient

async with AgentIDClient(
    base_url="http://localhost:8000",
    agent_id="your-agent-id",
    api_key="agid_your_key",
) as client:
    token = await client.get_token()           # short-lived RS256 JWT
    await client.log_action(                   # audit every action
        action="email:send",
        resource="user@example.com",
        result="allowed",
    )
    allowed, reason = await client.verify(     # check policy before acting
        "email:send", "user@example.com"
    )

TypeScript:

npm install @agentid/sdk
import { AgentIDClient } from "@agentid/sdk";

const client = new AgentIDClient({
  baseUrl: "http://localhost:8000",
  agentId: process.env.AGENTID_AGENT_ID!,
  apiKey: process.env.AGENTID_API_KEY!,
});

const token = await client.getToken();
await client.logAction({ action: "stripe:charge", resource: "usd:99" });
await client.assertAllowed("stripe:charge", "usd:99"); // throws if denied

LangChain (2 lines):

from agentid.middleware.langchain import agentid_langchain_middleware

tools = agentid_langchain_middleware(tools=my_tools, client=client)
# Every tool call is now verified + audited automatically

Architecture

graph TB
    subgraph YourAgent[Your Agent]
        A[Agent Code] -->|1. get token| SDK[AgentID SDK]
        A -->|3. use token| EXT[External APIs]
        A -->|4. log action| SDK
    end

    subgraph AgentIDServer[AgentID Server]
        SDK -->|2. issue JWT| CRED[Credential Service RS256]
        CRED --> DB[(PostgreSQL)]
        CRED --> POLICY[Policy Engine]
        SDK --> AUDIT[Audit Service]
        AUDIT --> DB
    end

    subgraph ExternalService[External Service]
        EXT -->|5. verify token| VER[verify endpoint]
        VER --> POLICY
        VER -->|allowed or denied| EXT
    end

    subgraph Dashboard[Dashboard]
        DASH[Next.js UI] --> DB
    end

Flow:

  1. Agent requests a short-lived JWT from AgentID (authenticated with its API key)
  2. AgentID issues a signed RS256 token with the agent's scoped policies baked in
  3. Agent uses the token to call external services (Gmail, Stripe, internal APIs)
  4. External services call /v1/verify to confirm the token is valid + action is allowed
  5. Agent logs every action to the immutable audit trail

Core Concepts

Agent Registration

Every agent gets a unique agent_id and an api_key (shown only once). The api_key is used to request short-lived credentials. It never appears in the JWT.

Scoped Credentials (JWTs)

JWTs contain:

  • agent_id, owner_id — identity
  • scope.policies — what this agent is allowed to do
  • exp, iat, jti — expiry, issued-at, unique ID (for revocation)
  • Signed with RS256 — verifiable by any service with the public key

Default TTL: 15 minutes. Configurable per-agent or per-request.

Policy Language

Policies are simple JSON documents. Multiple policies can be attached to an agent:

{
  "effect": "allow",
  "resources": ["email:*", "calendar:read:*"],
  "actions": ["read", "send"],
  "conditions": {
    "max_daily": 100,
    "time_window": { "start": "09:00", "end": "17:00" },
    "ip_allowlist": ["10.0.0.0/8"]
  }
}

Effect: allow or deny. Explicit deny always wins.

Resources: Glob patterns matching namespace:subresource:...

  • email:* — all email resources
  • file:read:* — any read on any file
  • stripe:charge:usd:* — any USD charge
  • * — everything

Actions: What the agent can do — read, write, send, delete, *

Conditions: | Condition | Type | Description | |---|---|---| | max_daily | int | Max actions per day (resets at UTC midnight) | | time_window | {start, end} | UTC time range (HH:MM format) | | ip_allowlist | string[] | CIDR ranges the agent may call from |

Evaluation order: Policies evaluated by priority (highest first). First match wins. If no policy matches → default deny.

Audit Logs

Every call to /v1/audit/log records:

  • agent_id, jti — which agent, which credential
  • action, resource — what happened
  • resultallowed | denied | error
  • prompt_snippet — the prompt that triggered the action (truncated at 1024 chars)
  • tool_called, result_summary — what tool ran and what it returned
  • cost_usd, duration_ms — performance + cost tracking
  • ip_address, user_agent — network context

API Reference

Agents

| Method | Path | Description | |---|---|---| | POST | /v1/agents | Register a new agent | | GET | /v1/agents | List agents (filter by owner_id) | | GET | /v1/agents/{id} | Get agent details | | PATCH | /v1/agents/{id} | Update agent | | DELETE | /v1/agents/{id} | Delete agent | | POST | /v1/agents/{id}/policies | Add a policy | | GET | /v1/agents/{id}/policies | List policies |

Credentials

| Method | Path | Description | |---|---|---| | POST | /v1/credentials/issue | Issue a JWT (requires X-API-Key header) | | POST | /v1/credentials/{id}/revoke | Revoke a credential | | GET | /v1/credentials/{agent_id}/list | List credentials |

Audit

| Method | Path | Description | |---|---|---| | POST | /v1/audit/log | Log an action (requires Authorization: Bearer <token>) | | GET | /v1/audit/logs | Query audit logs | | GET | /v1/audit/logs/{agent_id}/stats | Aggregate stats |

Verify

| Method | Path | Description | |---|---|---| | POST | /v1/verify | Verify token + policy for an action | | GET | /v1/verify/public-key | Get RS256 public key |


Integration Examples

LangChain / LangGraph

from agentid import AgentIDClient
from agentid.middleware.langchain import agentid_langchain_middleware

async with AgentIDClient(...) as client:
    safe_tools = agentid_langchain_middleware(
        tools=[email_tool, search_tool, file_tool],
        client=client,
        enforce_policy=True,
    )
    agent = create_react_agent(llm=llm, tools=safe_tools)

CrewAI

from crewai import Task
from agentid.middleware.crewai import agentid_task_callback

task = Task(
    description="Research competitors",
    agent=researcher,
    callback=agentid_task_callback(client, action="research:web"),
)

External service verification (any language)

import httpx

async def verify_agent_token(token: str, action: str, resource: str) -> bool:
    async with httpx.AsyncClient() as http:
        resp = await http.post(
            "http://agentid-server/v1/verify",
            json={"action": action, "resource": resource},
            headers={"Authorization": f"Bearer {token}"},
        )
    return resp.json()["allowed"]

Configuration

| Variable | Default | Description | |---|---|---| | DATABASE_URL | sqlite+aiosqlite:///./agentid.db | PostgreSQL or SQLite | | REDIS_URL | redis://localhost:6379 | Redis for rate limiting | | SECRET_KEY | — | App secret (32+ chars) | | ENVIRONMENT | development | development or production | | CORS_ORIGINS | http://localhost:3000 | Comma-separated allowed origins | | DEFAULT_TOKEN_TTL_MINUTES | 15 | Default JWT lifetime | | MAX_TOKEN_TTL_MINUTES | 1440 | Maximum allowed JWT lifetime | | LOG_LEVEL | info | Logging verbosity |


Deployment

Railway (one click)

Deploy on Railway

Fly.io

fly launch --name agentid-backend --dockerfile backend/Dockerfile
fly postgres create --name agentid-db
fly secrets set DATABASE_URL=... SECRET_KEY=$(openssl rand -hex 32)
fly deploy

Docker Compose (self-hosted)

cp .env.example .env
docker compose up -d

Security

  • Private keys never stored in DB — RS256 key pair lives on disk at keys/. Back this up.
  • API keys are hashed — SHA-256 one-way hash. Original never stored.
  • Short-lived tokens — 15-minute default TTL limits blast radius of a leaked token.
  • Token revocation — JTI tracked in DB; revoked JTIs checked on every verify call.
  • Rate limiting — 60 req/min per IP via slowapi + Redis.
  • Input sanitization — All inputs validated via Pydantic v2.
  • CORS — Configurable allowed origins; defaults to localhost only.
  • Never log secrets — API keys, tokens, and private keys are never written to logs.

Key Rotation

make keygen
docker compose restart backend

Roadmap

  • [ ] On-chain identity — Anchor agent identities to a blockchain for immutable provenance
  • [ ] Multi-org support — Teams, orgs, hierarchical ownership
  • [ ] AgentID Cloud — Hosted version (waitlist open)
  • [ ] OIDC/OAuth2 bridge — Let agents authenticate to any OAuth2-compatible service
  • [ ] Agent-to-agent delegation — Agent A grants limited access to Agent B
  • [ ] OpenTelemetry traces — Full distributed tracing for multi-agent workflows
  • [ ] MCP server — AgentID as a Model Context Protocol server
  • [ ] Helm chart — Production Kubernetes deployment

Development

git clone https://github.com/Pedroshakoor/Agent-ID
cd Agent-ID

make dev          # start everything with Docker Compose
make test         # run all tests
make lint         # lint all code
make migrate      # run DB migrations

Project Structure

Agent-ID/
├── backend/              # FastAPI server (Python 3.12)
│   ├── app/
│   │   ├── main.py       # FastAPI app entry point
│   │   ├── config.py     # Settings (pydantic-settings)
│   │   ├── database.py   # SQLAlchemy async engine
│   │   ├── models/       # SQLModel table definitions
│   │   ├── routers/      # API route handlers
│   │   ├── services/     # JWT, policy engine, audit
│   │   └── middleware/   # Rate limiting
│   ├── migrations/       # Alembic migrations
│   └── tests/            # pytest test suite
├── frontend/             # Next.js 15 dashboard
│   ├── app/              # App Router pages
│   └── components/       # shadcn/ui + custom components
├── sdks/
│   ├── python/           # agentid (PyPI)
│   └── typescript/       # @agentid/sdk (npm)
├── examples/             # Integration examples
└── .github/workflows/    # CI/CD

Contributing

See CONTRIBUTING.md. PRs welcome.

License

MIT — see LICENSE.


Built for the agent infrastructure era.

Made by @pedroshakoor — follow for updates.

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB REPOS

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/contract"
curl -s "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 5d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_REPOS",
      "generatedAt": "2026-04-16T23:51:16.137Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "crewai",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "multi-agent",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:crewai|supported|profile capability:multi-agent|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Pedroshakoor",
    "href": "https://github.com/Pedroshakoor/Agent-ID",
    "sourceUrl": "https://github.com/Pedroshakoor/Agent-ID",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:25.503Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:25.503Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "2 GitHub stars",
    "href": "https://github.com/Pedroshakoor/Agent-ID",
    "sourceUrl": "https://github.com/Pedroshakoor/Agent-ID",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:25.503Z",
    "isPublic": true
  },
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/crewai-pedroshakoor-agent-id/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to Agent-ID and adjacent AI workflows.