Crawler Summary

RedWeaver answer-first brief

Autonomous AI-powered vulnerability assessment platform — multi-agent bug hunting with CrewAI, real security tools, and real-time streaming <p align="center"> <img src="docs/redweaver-banner.png" alt="RedWeaver" width="800"/> </p> <p align="center"> <a href="#quick-start">Quick Start</a> &bull; <a href="#ui-overview">UI overview</a> &bull; <a href="#architecture">Architecture</a> &bull; <a href="#agent-pipeline">Agents</a> &bull; <a href="#tools">Tools</a> &bull; <a href="#llm-providers">LLM Providers</a> &bull; <a href="#contributing">Contributing</a> & Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.

Freshness

Last checked 4/15/2026

Best For

RedWeaver is best for crewai, multi-agent workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB REPOS, runtime-metrics, public facts pack

Claim this agent
Agent DossierGITHUB REPOSSafety: 66/100

RedWeaver

Autonomous AI-powered vulnerability assessment platform — multi-agent bug hunting with CrewAI, real security tools, and real-time streaming <p align="center"> <img src="docs/redweaver-banner.png" alt="RedWeaver" width="800"/> </p> <p align="center"> <a href="#quick-start">Quick Start</a> &bull; <a href="#ui-overview">UI overview</a> &bull; <a href="#architecture">Architecture</a> &bull; <a href="#agent-pipeline">Agents</a> &bull; <a href="#tools">Tools</a> &bull; <a href="#llm-providers">LLM Providers</a> &bull; <a href="#contributing">Contributing</a> &

OpenClawself-declared

Public facts

5

Change events

1

Artifacts

0

Freshness

Apr 15, 2026

Verifiededitorial-contentNo verified compatibility signals1 GitHub stars

Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.

1 GitHub starsTrust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Apr 15, 2026

Vendor

Tarzeh

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.

Setup snapshot

  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Tarzeh

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Adoption (1)

Adoption signal

1 GitHub stars

profilemedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB REPOS

Extracted files

0

Examples

4

Snippets

0

Languages

python

Executable Examples

bash

# 1. Clone the repo
git clone https://github.com/TarzEH/RedWeaver.git
cd RedWeaver

# 2. Configure API keys
cp .env.example .env
# Edit .env — add at least one LLM key (OpenAI, Anthropic, or Google)

# 3. Build and run
docker compose up --build

# 4. Open the UI
open http://localhost:5173

text

RedWeaver/
├── backend/
│   └── app/
│       ├── api/                 # FastAPI routes (chat, stream, runs, reports, settings)
│       ├── core/                # Config, EventBus, LLM factory, dependency injection
│       ├── crews/               # CrewAI crews (e.g. bug_hunt: YAML + builder)
│       ├── domain/              # Domain entities
│       ├── dto/                 # API request/response shapes
│       ├── graph/               # Hunt workflow graph (re-exports crew topology)
│       ├── models/              # Run, huntflow, event payloads
│       ├── reports/             # Report generation and templates
│       ├── repositories/        # Redis-persisted data stores
│       ├── services/            # Hunt execution, chat, keys management
│       └── tools/               # CrewAI tools + cli/ wrappers
├── docs/
│   ├── ARCHITECTURE.md          # Docker images vs folder layers
│   └── screenshots/             # UI PNGs embedded above under “UI overview”
├── frontend/
│   └── src/
│       ├── app/                 # Router, shell
│       ├── components/          # layout, ui, domain
│       ├── config/              # Provider/model definitions
│       ├── contexts/            # Auth, Hunt
│       ├── features/            # Route-level pages
│       ├── hooks/               # useSSE, useRunStream
│       ├── services/            # api.ts, http.ts (JWT client)
│       └── types/               # TypeScript interfaces (API, events)
├── knowledge-service/           # RAG microservice (Chroma)
├── docker-compose.yml           # Redis, backend, frontend, knowledge service, Redis Insight
├── backend/Dockerfile           # Backend with security tools
└── .env.example                 # Environment configuration template

bash

# Backend (requires Python 3.11+)
cd backend
pip install -r requirements.txt
uvicorn app.main:app --reload --port 8000

# Frontend (requires Node 20+)
cd frontend
npm install
npm run dev

bash

docker compose up --build

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB REPOS

Docs source

GITHUB REPOS

Editorial quality

ready

Autonomous AI-powered vulnerability assessment platform — multi-agent bug hunting with CrewAI, real security tools, and real-time streaming <p align="center"> <img src="docs/redweaver-banner.png" alt="RedWeaver" width="800"/> </p> <p align="center"> <a href="#quick-start">Quick Start</a> &bull; <a href="#ui-overview">UI overview</a> &bull; <a href="#architecture">Architecture</a> &bull; <a href="#agent-pipeline">Agents</a> &bull; <a href="#tools">Tools</a> &bull; <a href="#llm-providers">LLM Providers</a> &bull; <a href="#contributing">Contributing</a> &

Full README
<p align="center"> <img src="docs/redweaver-banner.png" alt="RedWeaver" width="800"/> </p> <p align="center"> <a href="#quick-start">Quick Start</a> &bull; <a href="#ui-overview">UI overview</a> &bull; <a href="#architecture">Architecture</a> &bull; <a href="#agent-pipeline">Agents</a> &bull; <a href="#tools">Tools</a> &bull; <a href="#llm-providers">LLM Providers</a> &bull; <a href="#contributing">Contributing</a> &bull; <a href="#license">License</a> </p> <p align="center"> <img src="https://img.shields.io/badge/version-0.3.0--beta-00d4aa?style=flat-square" alt="Version" /> <img src="https://img.shields.io/badge/license-MIT-blue?style=flat-square" alt="License" /> <img src="https://img.shields.io/badge/python-3.11+-3776ab?style=flat-square" alt="Python" /> <img src="https://img.shields.io/badge/react-18-61dafb?style=flat-square" alt="React" /> <img src="https://img.shields.io/badge/docker-required-2496ed?style=flat-square" alt="Docker" /> <img src="https://img.shields.io/badge/CrewAI-multi--agent-412991?style=flat-square" alt="CrewAI" /> </p>

What is RedWeaver?

RedWeaver is an autonomous vulnerability assessment platform that combines LLM reasoning with real security tools. You describe a target, and a team of AI agents collaboratively performs reconnaissance, crawling, fuzzing, vulnerability scanning, exploit analysis, and report generation — all streamed to your browser in real time.

Zero tool installation. Everything runs inside Docker. You only need an LLM API key.


UI overview

The web UI is a React app (Vite) served behind nginx in Docker. After login you get:

| Area | What you use it for | |------|---------------------| | Dashboard | Hunt stats, severity breakdown, latest findings at a glance | | Hunt | Chat-driven hunts with live agent stream (SSE), in-thread pentest report, and agent flow panel | | Findings | Sortable vulnerability list with severity badges, CVE references, and evidence | | Sessions & Targets | Workspace-scoped projects, session management, and target tracking | | Knowledge Base | Searchable methodology library — techniques, commands, and patterns | | Settings | Multi-provider LLM configuration (OpenAI, Anthropic, Google, Ollama, Meta) |

Screenshots

PNG captures live under docs/screenshots/. When updating them, use masked or empty API-key fields and non-sensitive targets only — never commit real keys or private hostnames in images.

<p align="center"> <img src="docs/screenshots/rw-dashboard.png" alt="Dashboard" width="720" /><br/> <sub>Dashboard — hunt stats, severity breakdown, and latest findings</sub> </p> <p align="center"> <img src="docs/screenshots/rw-hunt.png" alt="Hunt workspace" width="720" /><br/> <sub>Hunt — pentest report, agent flow panel, and chat interface</sub> </p> <p align="center"> <img src="docs/screenshots/rw-findings.png" alt="Findings" width="720" /><br/> <sub>Findings — vulnerability list sorted by severity with CVE details</sub> </p> <p align="center"> <img src="docs/screenshots/rw-sessions.png" alt="Sessions & Targets" width="720" /><br/> <sub>Sessions & Targets — workspaces and project management</sub> </p> <p align="center"> <img src="docs/screenshots/rw-settings.png" alt="Settings" width="720" /><br/> <sub>Settings — multi-provider LLM configuration</sub> </p>

Quick Start

# 1. Clone the repo
git clone https://github.com/TarzEH/RedWeaver.git
cd RedWeaver

# 2. Configure API keys
cp .env.example .env
# Edit .env — add at least one LLM key (OpenAI, Anthropic, or Google)

# 3. Build and run
docker compose up --build

# 4. Open the UI
open http://localhost:5173

The API is exposed at http://localhost:8001 (host port mapped to the backend container). The UI talks to it through the frontend nginx proxy (/api). Type a target URL in the Hunt chat and the agents will start hunting.

Demo login (first boot)

On a fresh Redis volume, the backend seeds a demo admin so you can sign in immediately:

| Field | Value | |-------|--------| | Email | admin@redweaver.io | | Password | redweaver |

Change this password (or register a new user and delete the demo account) before exposing the app beyond your machine. See SECURITY.md.

Tip: API keys can also be configured in the Settings page after launch — no .env edits required.


Architecture

<p align="center"> <img src="docs/redweaver-architecture.svg" alt="Architecture diagram" width="800" /> </p>

How It Works

  1. You describe a target — "Scan example.com for vulnerabilities"
  2. CrewAI builds a crew — target type (web vs host) and options pick which agents run; tasks chain with shared context
  3. Tasks run in order, with parallel batches where safe — after Recon completes, Fuzzer and Vuln Scanner are scheduled as asynchronous tasks so CrewAI can run them in parallel, then Crawler and later steps run when their inputs are ready. Steps that need prior outputs (e.g. exploit analysis after all scans) still wait — correctness comes before wall-clock speed.
  4. Findings stream in real-time — SSE pushes every tool call, thought, and finding to the UI
  5. Report is generated — the Report Writer produces a structured Markdown pentest report (headings, tables, lists, code blocks, callouts), grounded in hunt context and knowledge-base search where configured; the UI can render it in Standard or Enhanced styling

Why the graph looks “parallel”

The workflow graph is a dependency diagram: arrows show which agents consume outputs from others (e.g. many edges from Recon). It is not a Gantt chart. Branches do not mean “everything runs at the same time” — they mean “these steps all use data from Recon.” Actual execution follows the crew’s task list, with parallelism only where tools are independent and CrewAI’s async batching allows it.


Agent Pipeline

The workflow graph may show an Orchestrator node for visualization only. Which agents run depends on target type (web vs host/network) and options (e.g. SSH post-exploit).

| Phase | Agent | What It Does | |:-----:|-------|-------------| | 1 | Recon | Subdomain enumeration, port scanning, tech fingerprinting | | 2a / 2b | Fuzzer · Vuln Scanner | Run in parallel after recon (async batch): fuzzing + nuclei/nikto | | 3 | Crawler | Endpoint discovery, JS analysis, form extraction (web targets; waits for fuzzer when present) | | 4 | Web Search | OSINT — CVE lookup, exploit databases, public disclosures | | 5 | Exploit Analyst | Attack chain correlation, risk assessment | | 6 | Report Writer | Structured Markdown report (methodology, findings, remediation) | | 7 | Privesc / Tunnel / Post-exploit | Optional when SSH targets are configured |

Phases are logical; the exact task order is defined in code (CrewFactory) and may differ slightly by target (e.g. no crawler on non-web targets).


Tools

All tools run as CLI binaries inside the Docker container — no external accounts or paid APIs needed.

| Tool | Category | Purpose | |------|----------|---------| | nmap | Recon | Port scanning, service detection | | subfinder | Recon | Subdomain enumeration | | httpx | Recon | HTTP probing, tech detection | | whatweb | Recon | Web technology fingerprinting | | theHarvester | OSINT | Email, subdomain, IP harvesting | | nuclei | Scanning | Template-based vulnerability scanning | | nikto | Scanning | Web server misconfiguration scanner | | ffuf | Fuzzing | Web fuzzer for directories and parameters | | gobuster | Fuzzing | Directory/DNS brute-forcing | | katana | Crawling | Web crawler for endpoint discovery |


LLM Providers

RedWeaver supports multiple LLM providers. Configure via .env or the Settings UI at runtime.

| Provider | Models | Key Variable | |----------|--------|-------------| | OpenAI | GPT-4 family, GPT-4o, GPT-4o-mini (see Settings) | OPENAI_API_KEY | | Anthropic | Claude Opus / Sonnet / Haiku (see Settings) | ANTHROPIC_API_KEY | | Google | Gemini (see Settings) | GOOGLE_API_KEY | | Ollama | Llama, Mistral, Qwen, etc. (local) | OLLAMA_BASE_URL |

At least one provider key is required. The cheapest models (GPT-4o-mini, Haiku, Gemini Flash) work well for most targets.


Environment Variables

| Variable | Required | Description | |----------|:--------:|-------------| | OPENAI_API_KEY | * | OpenAI API key | | ANTHROPIC_API_KEY | * | Anthropic API key | | GOOGLE_API_KEY | * | Google Gemini API key | | JWT_SECRET | Yes for production | Stable secret for signing auth tokens (random per boot if unset — sessions reset on restart) | | OLLAMA_BASE_URL | No | Ollama server URL (default: http://host.docker.internal:11434) | | REDIS_URL | No | Redis connection (default: redis://redis:6379/0 in Compose; host dev default often redis://localhost:6380/0) | | KNOWLEDGE_SERVICE_URL | No | Knowledge RAG API (default in Compose: http://knowledge:8100) | | CORS_ORIGINS | No | Allowed CORS origins (default: *) |

* At least one LLM provider key is required. Keys can also be set in the Settings UI.


Project Structure

RedWeaver/
├── backend/
│   └── app/
│       ├── api/                 # FastAPI routes (chat, stream, runs, reports, settings)
│       ├── core/                # Config, EventBus, LLM factory, dependency injection
│       ├── crews/               # CrewAI crews (e.g. bug_hunt: YAML + builder)
│       ├── domain/              # Domain entities
│       ├── dto/                 # API request/response shapes
│       ├── graph/               # Hunt workflow graph (re-exports crew topology)
│       ├── models/              # Run, huntflow, event payloads
│       ├── reports/             # Report generation and templates
│       ├── repositories/        # Redis-persisted data stores
│       ├── services/            # Hunt execution, chat, keys management
│       └── tools/               # CrewAI tools + cli/ wrappers
├── docs/
│   ├── ARCHITECTURE.md          # Docker images vs folder layers
│   └── screenshots/             # UI PNGs embedded above under “UI overview”
├── frontend/
│   └── src/
│       ├── app/                 # Router, shell
│       ├── components/          # layout, ui, domain
│       ├── config/              # Provider/model definitions
│       ├── contexts/            # Auth, Hunt
│       ├── features/            # Route-level pages
│       ├── hooks/               # useSSE, useRunStream
│       ├── services/            # api.ts, http.ts (JWT client)
│       └── types/               # TypeScript interfaces (API, events)
├── knowledge-service/           # RAG microservice (Chroma)
├── docker-compose.yml           # Redis, backend, frontend, knowledge service, Redis Insight
├── backend/Dockerfile           # Backend with security tools
└── .env.example                 # Environment configuration template

Key Design Decisions

  • CrewAI — hunts are built from YAML agent/task definitions (app/crews/bug_hunt/) with a Python CrewFactory that wires tools, structured outputs, and Process.sequential. Consecutive tasks marked async_execution run in parallel batches until the next synchronous task (e.g. fuzzer + vuln scanner after recon). The workflow graph is dependency-oriented, not a timeline.
  • Multi-provider LLM factory — auto-detects available API keys and supports OpenAI, Anthropic, Google Gemini, and Ollama with runtime model selection (Settings or env).
  • BaseCLITool pattern — security CLI tools wrap scanners and parsers; execution runs inside the backend container with timeouts.
  • EventBus — async pub/sub with per-run queues for streaming; buffers when no SSE client is connected yet.
  • Redis persistence — runs, findings, graph state, and sessions survive container restarts.
  • Knowledge service — optional Chroma-backed RAG over knowledge-base/; agents call knowledge_search for methodology (e.g. reporting). Compose wires KNOWLEDGE_SERVICE_URL to the knowledge container.
  • Markdown-first report — the Report Writer outputs structured Markdown; the React report view renders it with typography and callouts, plus an optional Enhanced reading mode.

Development

# Backend (requires Python 3.11+)
cd backend
pip install -r requirements.txt
uvicorn app.main:app --reload --port 8000

# Frontend (requires Node 20+)
cd frontend
npm install
npm run dev

Or use Docker for everything:

docker compose up --build

Disclaimer

RedWeaver is a security research and educational tool. Only use it against targets you own or have explicit permission to test. Unauthorized vulnerability scanning is illegal in most jurisdictions. The authors are not responsible for any misuse.


Contributing

See CONTRIBUTING.md.


License

MIT © 2025-2026 Ori Ashkenazi

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB REPOS

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract"
curl -s "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_REPOS",
      "generatedAt": "2026-04-17T03:34:18.336Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "crewai",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "multi-agent",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:crewai|supported|profile capability:multi-agent|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Tarzeh",
    "href": "https://github.com/TarzEH/RedWeaver",
    "sourceUrl": "https://github.com/TarzEH/RedWeaver",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:27.560Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:27.560Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "1 GitHub stars",
    "href": "https://github.com/TarzEH/RedWeaver",
    "sourceUrl": "https://github.com/TarzEH/RedWeaver",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:27.560Z",
    "isPublic": true
  },
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/crewai-tarzeh-redweaver/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to RedWeaver and adjacent AI workflows.