Crawler Summary

openshift-secure-ai answer-first brief

Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, model registry, TrustyAI, notebooks, RAG, chatbot, codegen. --- name: openshift-secure-ai description: > Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, Capability contract not published. No trust telemetry is available yet. Last updated 2/24/2026.

Freshness

Last checked 2/24/2026

Best For

openshift-secure-ai is best for verify workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 89/100

openshift-secure-ai

Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, model registry, TrustyAI, notebooks, RAG, chatbot, codegen. --- name: openshift-secure-ai description: > Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service,

OpenClawself-declared

Public facts

4

Change events

1

Artifacts

0

Freshness

Feb 24, 2026

Verifiededitorial-contentNo verified compatibility signals

Capability contract not published. No trust telemetry is available yet. Last updated 2/24/2026.

Trust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Feb 24, 2026

Vendor

Deanpeterson

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. Last updated 2/24/2026.

Setup snapshot

git clone https://github.com/deanpeterson/openshift-secure-ai.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Deanpeterson

profilemedium
Observed Feb 24, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Feb 24, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

bash scripts/check-platform.sh

bash

# Developer Hub
oc get pods -n rhdh-test -l app.kubernetes.io/name=developer-hub

# OpenShift AI operator
oc get pods -n redhat-ods-operator

# OpenShift AI dashboard and components
oc get dsci,dsc

# Pipeline operator
oc get pods -n openshift-pipelines

# TAS (Trusted Artifact Signer)
oc get pods -n trusted-artifact-signer

# TPA (Trusted Profile Analyzer)
oc get pods -n trustification

bash

curl -s -H "Authorization: Bearer $(oc create token developer-hub-sa -n rhdh-test 2>/dev/null || echo 'TOKEN')" \

bash

# Query the Developer Hub catalog API
   curl -s -H "Authorization: Bearer $(oc create token developer-hub-sa -n rhdh-test 2>/dev/null || echo 'TOKEN')" \
     "https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/catalog/entities?filter=kind=template" \
     | jq '.[].metadata.name'

text

https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/create

bash

curl -X POST \
     -H "Content-Type: application/json" \
     -H "Authorization: Bearer $TOKEN" \

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, model registry, TrustyAI, notebooks, RAG, chatbot, codegen. --- name: openshift-secure-ai description: > Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service,

Full README

name: openshift-secure-ai description: > Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, model registry, TrustyAI, notebooks, RAG, chatbot, codegen.

OpenShift Secure AI — Skill Reference

Cluster Context

| Resource | Value | |---|---| | Cluster | salamander.aimlworkbench.com | | API | https://api.salamander.aimlworkbench.com:6443 | | Developer Hub | https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/ | | Developer Hub NS | rhdh-test | | OpenShift AI NS | redhat-ods-applications (operator), per-project for workloads | | Llama 3.1 8B NS | llama-test | | Isaac Sim NS | isaac-sim |

Quick Health Check

Run the platform health check before any demo:

bash scripts/check-platform.sh

Or manually verify the critical operators:

# Developer Hub
oc get pods -n rhdh-test -l app.kubernetes.io/name=developer-hub

# OpenShift AI operator
oc get pods -n redhat-ods-operator

# OpenShift AI dashboard and components
oc get dsci,dsc

# Pipeline operator
oc get pods -n openshift-pipelines

# TAS (Trusted Artifact Signer)
oc get pods -n trusted-artifact-signer

# TPA (Trusted Profile Analyzer)
oc get pods -n trustification

Workflow 1: Scaffold a Secure AI Application

Use Developer Hub golden path templates to create a new application with built-in supply chain security.

Available Template Families

| Family | Templates | Key Feature | |---|---|---| | AI Lab | chatbot, codegen, RAG, audio-to-text, object-detection, model-server | AI/ML workloads with model integration | | TSSC | dotnet, go, java-quarkus, java-springboot, nodejs, python | Trusted Software Supply Chain (signing + SBOM) | | RHDH Standard | go, nodejs, python, spring-boot, quarkus + argocd/tekton | Standard golden paths with GitOps |

Steps

  1. List available templates:

    # Query the Developer Hub catalog API
    curl -s -H "Authorization: Bearer $(oc create token developer-hub-sa -n rhdh-test 2>/dev/null || echo 'TOKEN')" \
      "https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/catalog/entities?filter=kind=template" \
      | jq '.[].metadata.name'
    
  2. Scaffold via the UI — direct the user to:

    https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/create
    
  3. Scaffold via API (for automation):

    curl -X POST \
      -H "Content-Type: application/json" \
      -H "Authorization: Bearer $TOKEN" \
      "https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/scaffolder/v2/tasks" \
      -d '{
        "templateRef": "template:default/tssc-python",
        "values": {
          "component_id": "secure-ai-demo",
          "owner": "user:default/dean",
          "repo": { "host": "github.com", "owner": "dean-org", "name": "secure-ai-demo" }
        }
      }'
    
  4. Verify the scaffolded component appears in catalog:

    curl -s -H "Authorization: Bearer $TOKEN" \
      "https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/catalog/entities?filter=metadata.name=secure-ai-demo" \
      | jq '.[] | {name: .metadata.name, lifecycle: .spec.lifecycle}'
    

Deep dive: See references/developer-hub.md for full template details and API reference.


Workflow 2: Deploy and Manage AI Models

Check Existing Inference Services

# List all inference services across namespaces
oc get inferenceservices -A

# Check Llama 3.1 8B status
oc get inferenceservice -n llama-test -o wide

# Get detailed status with conditions
oc get inferenceservice -n llama-test -o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.status.conditions[*].type}={.status.conditions[*].status}{"\n"}{end}'

Deploy a New Model (KServe)

bash scripts/deploy-model.sh --name my-llm \
  --namespace ai-demo \
  --runtime vllm \
  --model-format pytorch \
  --storage-uri "s3://models/llama-3.1-8b"

Or apply directly:

cat <<'EOF' | oc apply -f -
apiVersion: serving.kserve.io/v1beta1
kind: InferenceService
metadata:
  name: llama-demo
  namespace: ai-demo
  annotations:
    serving.kserve.io/deploymentMode: RawDeployment
  labels:
    opendatahub.io/dashboard: "true"
spec:
  predictor:
    model:
      modelFormat:
        name: pytorch
      runtime: vllm-runtime
      storageUri: "s3://models/llama-3.1-8b"
      resources:
        requests:
          cpu: "4"
          memory: 16Gi
          nvidia.com/gpu: "1"
        limits:
          cpu: "8"
          memory: 32Gi
          nvidia.com/gpu: "1"
EOF

Check Model Registry

# List registered models
oc get pods -n redhat-ods-applications -l app=model-registry
oc exec -n redhat-ods-applications deploy/model-registry -- \
  curl -s localhost:8080/api/model_registry/v1alpha3/registered_models | jq '.items[].name'

Manage Notebooks

# List running notebooks
oc get notebooks -A

# Check notebook status
oc get notebook -n <namespace> -o jsonpath='{.items[*].status.readyReplicas}'

Deep dive: See references/openshift-ai.md for KServe vs ModelMesh, GPU scheduling, and pipeline details.


Workflow 3: Verify Supply Chain Security

Full Verification

bash scripts/verify-supply-chain.sh --namespace <app-namespace> --pipeline-run <run-name>

Manual Checks

Check Tekton pipeline run results:

# List recent pipeline runs
oc get pipelineruns -n <namespace> --sort-by=.metadata.creationTimestamp -o name | tail -5

# Get results from a specific run
oc get pipelinerun <run-name> -n <namespace> \
  -o jsonpath='{range .status.results[*]}{.name}: {.value}{"\n"}{end}'

Verify artifact signature with cosign:

# Get the image digest from the pipeline run
IMAGE=$(oc get pipelinerun <run-name> -n <namespace> \
  -o jsonpath='{.status.results[?(@.name=="IMAGE_URL")].value}')
DIGEST=$(oc get pipelinerun <run-name> -n <namespace> \
  -o jsonpath='{.status.results[?(@.name=="IMAGE_DIGEST")].value}')

# Verify signature using TAS (cluster Rekor + Fulcio)
REKOR_URL=$(oc get route -n trusted-artifact-signer rekor-server -o jsonpath='{.spec.host}')
cosign verify --rekor-url="https://${REKOR_URL}" \
  --certificate-identity-regexp=".*" \
  --certificate-oidc-issuer-regexp=".*" \
  "${IMAGE}@${DIGEST}"

Check SBOM:

# Retrieve SBOM attestation
cosign download attestation "${IMAGE}@${DIGEST}" | jq -r '.payload' | base64 -d | jq '.predicate'

# Or check via TPA
TPA_URL=$(oc get route -n trustification vexination-api -o jsonpath='{.spec.host}' 2>/dev/null)
curl -s "https://${TPA_URL}/api/v1/vex?advisory=${DIGEST}" | jq '.vulnerabilities'

Check Tekton Chains attestation:

# Verify chains is signing
oc get tektonconfig -o jsonpath='{.items[0].spec.chain}'

# Check taskrun attestation
oc get taskrun -n <namespace> -l tekton.dev/pipelineRun=<run-name> \
  -o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.metadata.annotations.chains\.tekton\.dev/signed}{"\n"}{end}'

Deep dive: See references/supply-chain-security.md for TAS architecture, TPA analysis, and SLSA compliance.


Workflow 4: End-to-End Demo Flow

This is the "zero to secure AI app" demo. Use this when walking a customer through the full platform story.

Pre-Demo Checklist

bash scripts/check-platform.sh

Demo Steps

Step 1 — Set the stage (1 min) Show the OpenShift console, highlight installed operators:

oc get csv -A | grep -E '(devhub|openshift-ai|pipelines|rhtas|trustification)' | awk '{print $2, $NF}'

Step 2 — Scaffold the app (3 min) Navigate to Developer Hub and create a new app from a TSSC template:

https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/create

Choose the TSSC Python template. This gives us:

  • A Python application repo with Tekton pipeline
  • Automatic artifact signing via TAS
  • SBOM generation and analysis via TPA
  • GitOps deployment via ArgoCD

Step 3 — Watch the pipeline (2 min)

# Find the pipeline run that was triggered
oc get pipelineruns -n <app-namespace> --sort-by=.metadata.creationTimestamp -w

# Show the pipeline tasks completing
oc get pipelinerun <run-name> -n <app-namespace> \
  -o jsonpath='{range .status.childReferences[*]}{.name}{"\t"}{.pipelineTaskName}{"\n"}{end}'

Step 4 — Prove the supply chain (3 min)

bash scripts/verify-supply-chain.sh --namespace <app-namespace> --pipeline-run <run-name>

Walk through:

  • The image was signed (cosign verify succeeds)
  • The SBOM was generated (show components list)
  • Tekton Chains recorded the attestation (show signed taskruns)
  • TPA analyzed the profile (show vulnerability scan)

Step 5 — Deploy the AI model (3 min) Show OpenShift AI:

# Show existing inference services
oc get inferenceservices -A

# Show the Llama model
oc describe inferenceservice -n llama-test

# Test the inference endpoint (if ready)
ISVC_URL=$(oc get inferenceservice -n llama-test -o jsonpath='{.items[0].status.url}')
curl -s "${ISVC_URL}/v1/chat/completions" \
  -H "Content-Type: application/json" \
  -d '{"model": "llama-3.1-8b", "messages": [{"role": "user", "content": "What is OpenShift?"}], "max_tokens": 100}'

Step 6 — Connect the story (2 min) Tie it together:

  • The developer used Developer Hub to scaffold in minutes, not weeks
  • The pipeline built, signed, and scanned automatically — zero friction
  • The security team can verify every artifact in the supply chain
  • The AI team has model serving, monitoring, and a registry ready to go
  • The platform team manages it all from one control plane

Deep dive: See references/demo-narratives.md for audience-specific talk tracks.


Workflow 5: Troubleshooting

Developer Hub Issues

# Check pod health
oc get pods -n rhdh-test
oc logs -n rhdh-test deploy/developer-hub --tail=50

# Check catalog refresh
oc logs -n rhdh-test deploy/developer-hub --tail=100 | grep -i catalog

# Verify GitHub auth
oc get secret -n rhdh-test -l app.kubernetes.io/name=developer-hub -o name

OpenShift AI Issues

# Check DSC/DSCI status
oc get dsc -o jsonpath='{.items[0].status.conditions[*].type}={.items[0].status.conditions[*].status}'

# Check inference service conditions
oc get inferenceservice -n llama-test -o json | jq '.items[].status.conditions'

# Check serving runtime
oc get servingruntimes -n llama-test

# GPU availability
oc describe nodes | grep -A5 "nvidia.com/gpu"

Pipeline / Supply Chain Issues

# Check pipeline operator
oc get pods -n openshift-pipelines -l app=tekton-pipelines-controller

# Check Tekton Chains controller
oc get pods -n openshift-pipelines -l app=tekton-chains-controller

# Check TAS components
oc get pods -n trusted-artifact-signer

# Check TPA components
oc get pods -n trustification

Value Propositions by Role

| Role | Key Message | |---|---| | CISO | Every artifact is signed and attested. Full SBOM visibility. SLSA Level 3 compliance out of the box. | | CTO | Developers ship AI apps in hours, not months. Security is built in, not bolted on. | | Dev Lead | Golden path templates mean no more YAML wrangling. Focus on code, not plumbing. | | Platform Eng | One platform for apps + AI + security. Operators handle lifecycle. GitOps handles drift. |

Deep dive: See references/demo-narratives.md for full talk tracks.

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/snapshot"
curl -s "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract"
curl -s "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 5d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-16T23:38:04.759Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "verify",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:verify|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Deanpeterson",
    "href": "https://github.com/deanpeterson/openshift-secure-ai",
    "sourceUrl": "https://github.com/deanpeterson/openshift-secure-ai",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-24T19:43:14.176Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-02-24T19:43:14.176Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to openshift-secure-ai and adjacent AI workflows.