Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, model registry, TrustyAI, notebooks, RAG, chatbot, codegen. --- name: openshift-secure-ai description: > Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, Capability contract not published. No trust telemetry is available yet. Last updated 2/24/2026.
Freshness
Last checked 2/24/2026
Best For
openshift-secure-ai is best for verify workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, model registry, TrustyAI, notebooks, RAG, chatbot, codegen. --- name: openshift-secure-ai description: > Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service,
Public facts
4
Change events
1
Artifacts
0
Freshness
Feb 24, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 2/24/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 24, 2026
Vendor
Deanpeterson
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 2/24/2026.
Setup snapshot
git clone https://github.com/deanpeterson/openshift-secure-ai.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Deanpeterson
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
bash
bash scripts/check-platform.sh
bash
# Developer Hub oc get pods -n rhdh-test -l app.kubernetes.io/name=developer-hub # OpenShift AI operator oc get pods -n redhat-ods-operator # OpenShift AI dashboard and components oc get dsci,dsc # Pipeline operator oc get pods -n openshift-pipelines # TAS (Trusted Artifact Signer) oc get pods -n trusted-artifact-signer # TPA (Trusted Profile Analyzer) oc get pods -n trustification
bash
curl -s -H "Authorization: Bearer $(oc create token developer-hub-sa -n rhdh-test 2>/dev/null || echo 'TOKEN')" \
bash
# Query the Developer Hub catalog API
curl -s -H "Authorization: Bearer $(oc create token developer-hub-sa -n rhdh-test 2>/dev/null || echo 'TOKEN')" \
"https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/catalog/entities?filter=kind=template" \
| jq '.[].metadata.name'text
https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/create
bash
curl -X POST \
-H "Content-Type: application/json" \
-H "Authorization: Bearer $TOKEN" \Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service, model registry, TrustyAI, notebooks, RAG, chatbot, codegen. --- name: openshift-secure-ai description: > Manages OpenShift Platform Plus, Advanced Developer Suite, and OpenShift AI on the salamander.aimlworkbench.com cluster. Triggers on: OpenShift, Developer Hub, RHDH, OpenShift AI, RHOAI, model serving, KServe, ModelMesh, supply chain, TSSC, TAS, TPA, artifact signing, SBOM, cosign, Tekton Chains, pipeline security, golden path templates, pre-sales demo, inference service,
| Resource | Value |
|---|---|
| Cluster | salamander.aimlworkbench.com |
| API | https://api.salamander.aimlworkbench.com:6443 |
| Developer Hub | https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/ |
| Developer Hub NS | rhdh-test |
| OpenShift AI NS | redhat-ods-applications (operator), per-project for workloads |
| Llama 3.1 8B NS | llama-test |
| Isaac Sim NS | isaac-sim |
Run the platform health check before any demo:
bash scripts/check-platform.sh
Or manually verify the critical operators:
# Developer Hub
oc get pods -n rhdh-test -l app.kubernetes.io/name=developer-hub
# OpenShift AI operator
oc get pods -n redhat-ods-operator
# OpenShift AI dashboard and components
oc get dsci,dsc
# Pipeline operator
oc get pods -n openshift-pipelines
# TAS (Trusted Artifact Signer)
oc get pods -n trusted-artifact-signer
# TPA (Trusted Profile Analyzer)
oc get pods -n trustification
Use Developer Hub golden path templates to create a new application with built-in supply chain security.
| Family | Templates | Key Feature | |---|---|---| | AI Lab | chatbot, codegen, RAG, audio-to-text, object-detection, model-server | AI/ML workloads with model integration | | TSSC | dotnet, go, java-quarkus, java-springboot, nodejs, python | Trusted Software Supply Chain (signing + SBOM) | | RHDH Standard | go, nodejs, python, spring-boot, quarkus + argocd/tekton | Standard golden paths with GitOps |
List available templates:
# Query the Developer Hub catalog API
curl -s -H "Authorization: Bearer $(oc create token developer-hub-sa -n rhdh-test 2>/dev/null || echo 'TOKEN')" \
"https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/catalog/entities?filter=kind=template" \
| jq '.[].metadata.name'
Scaffold via the UI — direct the user to:
https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/create
Scaffold via API (for automation):
curl -X POST \
-H "Content-Type: application/json" \
-H "Authorization: Bearer $TOKEN" \
"https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/scaffolder/v2/tasks" \
-d '{
"templateRef": "template:default/tssc-python",
"values": {
"component_id": "secure-ai-demo",
"owner": "user:default/dean",
"repo": { "host": "github.com", "owner": "dean-org", "name": "secure-ai-demo" }
}
}'
Verify the scaffolded component appears in catalog:
curl -s -H "Authorization: Bearer $TOKEN" \
"https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/api/catalog/entities?filter=metadata.name=secure-ai-demo" \
| jq '.[] | {name: .metadata.name, lifecycle: .spec.lifecycle}'
Deep dive: See references/developer-hub.md for full template details and API reference.
# List all inference services across namespaces
oc get inferenceservices -A
# Check Llama 3.1 8B status
oc get inferenceservice -n llama-test -o wide
# Get detailed status with conditions
oc get inferenceservice -n llama-test -o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.status.conditions[*].type}={.status.conditions[*].status}{"\n"}{end}'
bash scripts/deploy-model.sh --name my-llm \
--namespace ai-demo \
--runtime vllm \
--model-format pytorch \
--storage-uri "s3://models/llama-3.1-8b"
Or apply directly:
cat <<'EOF' | oc apply -f -
apiVersion: serving.kserve.io/v1beta1
kind: InferenceService
metadata:
name: llama-demo
namespace: ai-demo
annotations:
serving.kserve.io/deploymentMode: RawDeployment
labels:
opendatahub.io/dashboard: "true"
spec:
predictor:
model:
modelFormat:
name: pytorch
runtime: vllm-runtime
storageUri: "s3://models/llama-3.1-8b"
resources:
requests:
cpu: "4"
memory: 16Gi
nvidia.com/gpu: "1"
limits:
cpu: "8"
memory: 32Gi
nvidia.com/gpu: "1"
EOF
# List registered models
oc get pods -n redhat-ods-applications -l app=model-registry
oc exec -n redhat-ods-applications deploy/model-registry -- \
curl -s localhost:8080/api/model_registry/v1alpha3/registered_models | jq '.items[].name'
# List running notebooks
oc get notebooks -A
# Check notebook status
oc get notebook -n <namespace> -o jsonpath='{.items[*].status.readyReplicas}'
Deep dive: See references/openshift-ai.md for KServe vs ModelMesh, GPU scheduling, and pipeline details.
bash scripts/verify-supply-chain.sh --namespace <app-namespace> --pipeline-run <run-name>
Check Tekton pipeline run results:
# List recent pipeline runs
oc get pipelineruns -n <namespace> --sort-by=.metadata.creationTimestamp -o name | tail -5
# Get results from a specific run
oc get pipelinerun <run-name> -n <namespace> \
-o jsonpath='{range .status.results[*]}{.name}: {.value}{"\n"}{end}'
Verify artifact signature with cosign:
# Get the image digest from the pipeline run
IMAGE=$(oc get pipelinerun <run-name> -n <namespace> \
-o jsonpath='{.status.results[?(@.name=="IMAGE_URL")].value}')
DIGEST=$(oc get pipelinerun <run-name> -n <namespace> \
-o jsonpath='{.status.results[?(@.name=="IMAGE_DIGEST")].value}')
# Verify signature using TAS (cluster Rekor + Fulcio)
REKOR_URL=$(oc get route -n trusted-artifact-signer rekor-server -o jsonpath='{.spec.host}')
cosign verify --rekor-url="https://${REKOR_URL}" \
--certificate-identity-regexp=".*" \
--certificate-oidc-issuer-regexp=".*" \
"${IMAGE}@${DIGEST}"
Check SBOM:
# Retrieve SBOM attestation
cosign download attestation "${IMAGE}@${DIGEST}" | jq -r '.payload' | base64 -d | jq '.predicate'
# Or check via TPA
TPA_URL=$(oc get route -n trustification vexination-api -o jsonpath='{.spec.host}' 2>/dev/null)
curl -s "https://${TPA_URL}/api/v1/vex?advisory=${DIGEST}" | jq '.vulnerabilities'
Check Tekton Chains attestation:
# Verify chains is signing
oc get tektonconfig -o jsonpath='{.items[0].spec.chain}'
# Check taskrun attestation
oc get taskrun -n <namespace> -l tekton.dev/pipelineRun=<run-name> \
-o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.metadata.annotations.chains\.tekton\.dev/signed}{"\n"}{end}'
Deep dive: See references/supply-chain-security.md for TAS architecture, TPA analysis, and SLSA compliance.
This is the "zero to secure AI app" demo. Use this when walking a customer through the full platform story.
bash scripts/check-platform.sh
Step 1 — Set the stage (1 min) Show the OpenShift console, highlight installed operators:
oc get csv -A | grep -E '(devhub|openshift-ai|pipelines|rhtas|trustification)' | awk '{print $2, $NF}'
Step 2 — Scaffold the app (3 min) Navigate to Developer Hub and create a new app from a TSSC template:
https://v1-developer-hub-rhdh-test.apps.salamander.aimlworkbench.com/create
Choose the TSSC Python template. This gives us:
Step 3 — Watch the pipeline (2 min)
# Find the pipeline run that was triggered
oc get pipelineruns -n <app-namespace> --sort-by=.metadata.creationTimestamp -w
# Show the pipeline tasks completing
oc get pipelinerun <run-name> -n <app-namespace> \
-o jsonpath='{range .status.childReferences[*]}{.name}{"\t"}{.pipelineTaskName}{"\n"}{end}'
Step 4 — Prove the supply chain (3 min)
bash scripts/verify-supply-chain.sh --namespace <app-namespace> --pipeline-run <run-name>
Walk through:
Step 5 — Deploy the AI model (3 min) Show OpenShift AI:
# Show existing inference services
oc get inferenceservices -A
# Show the Llama model
oc describe inferenceservice -n llama-test
# Test the inference endpoint (if ready)
ISVC_URL=$(oc get inferenceservice -n llama-test -o jsonpath='{.items[0].status.url}')
curl -s "${ISVC_URL}/v1/chat/completions" \
-H "Content-Type: application/json" \
-d '{"model": "llama-3.1-8b", "messages": [{"role": "user", "content": "What is OpenShift?"}], "max_tokens": 100}'
Step 6 — Connect the story (2 min) Tie it together:
Deep dive: See references/demo-narratives.md for audience-specific talk tracks.
# Check pod health
oc get pods -n rhdh-test
oc logs -n rhdh-test deploy/developer-hub --tail=50
# Check catalog refresh
oc logs -n rhdh-test deploy/developer-hub --tail=100 | grep -i catalog
# Verify GitHub auth
oc get secret -n rhdh-test -l app.kubernetes.io/name=developer-hub -o name
# Check DSC/DSCI status
oc get dsc -o jsonpath='{.items[0].status.conditions[*].type}={.items[0].status.conditions[*].status}'
# Check inference service conditions
oc get inferenceservice -n llama-test -o json | jq '.items[].status.conditions'
# Check serving runtime
oc get servingruntimes -n llama-test
# GPU availability
oc describe nodes | grep -A5 "nvidia.com/gpu"
# Check pipeline operator
oc get pods -n openshift-pipelines -l app=tekton-pipelines-controller
# Check Tekton Chains controller
oc get pods -n openshift-pipelines -l app=tekton-chains-controller
# Check TAS components
oc get pods -n trusted-artifact-signer
# Check TPA components
oc get pods -n trustification
| Role | Key Message | |---|---| | CISO | Every artifact is signed and attested. Full SBOM visibility. SLSA Level 3 compliance out of the box. | | CTO | Developers ship AI apps in hours, not months. Security is built in, not bolted on. | | Dev Lead | Golden path templates mean no more YAML wrangling. Focus on code, not plumbing. | | Platform Eng | One platform for apps + AI + security. Operators handle lifecycle. GitOps handles drift. |
Deep dive: See references/demo-narratives.md for full talk tracks.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/snapshot"
curl -s "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract"
curl -s "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:38:04.759Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "verify",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:verify|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Deanpeterson",
"href": "https://github.com/deanpeterson/openshift-secure-ai",
"sourceUrl": "https://github.com/deanpeterson/openshift-secure-ai",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-24T19:43:14.176Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-24T19:43:14.176Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/deanpeterson-openshift-secure-ai/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to openshift-secure-ai and adjacent AI workflows.