Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Read and write Obsidian notes stored in EVC Team Relay collaborative vault. Use when agent needs to: read note content from a shared Obsidian vault, create or update documents, list available shared folders and documents, or search across shared vault content. Relay stores documents as Yjs CRDTs; this skill provides a REST interface to read/write their text content. --- name: evc-team-relay description: > Read and write Obsidian notes stored in EVC Team Relay collaborative vault. Use when agent needs to: read note content from a shared Obsidian vault, create or update documents, list available shared folders and documents, or search across shared vault content. Relay stores documents as Yjs CRDTs; this skill provides a REST interface to read/write their text content. --- EVC Tea Published capability contract available. No trust telemetry is available yet. Last updated 2/24/2026.
Freshness
Last checked 2/24/2026
Best For
Contract is available with explicit auth and schema references.
Not Ideal For
evc-team-relay is not ideal for teams that need stronger public trust telemetry, lower setup complexity, or more explicit contract coverage before production rollout.
Evidence Sources Checked
editorial-content, capability-contract, runtime-metrics, public facts pack
Read and write Obsidian notes stored in EVC Team Relay collaborative vault. Use when agent needs to: read note content from a shared Obsidian vault, create or update documents, list available shared folders and documents, or search across shared vault content. Relay stores documents as Yjs CRDTs; this skill provides a REST interface to read/write their text content. --- name: evc-team-relay description: > Read and write Obsidian notes stored in EVC Team Relay collaborative vault. Use when agent needs to: read note content from a shared Obsidian vault, create or update documents, list available shared folders and documents, or search across shared vault content. Relay stores documents as Yjs CRDTs; this skill provides a REST interface to read/write their text content. --- EVC Tea
Public facts
6
Change events
1
Artifacts
0
Freshness
Feb 24, 2026
Published capability contract available. No trust telemetry is available yet. Last updated 2/24/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Feb 24, 2026
Vendor
Entire Vc
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Published capability contract available. No trust telemetry is available yet. Last updated 2/24/2026.
Setup snapshot
git clone https://github.com/entire-vc/evc-team-relay-openclaw-skill.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Entire Vc
Protocol compatibility
OpenClaw
Auth modes
api_key
Machine-readable schemas
OpenAPI or schema references published
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
bash
# 1. Authenticate — get a JWT token TOKEN=$(scripts/auth.sh) # 2. List shares to find available documents scripts/list-shares.sh "$TOKEN" # 3. Read a file from a folder share BY PATH (most common) scripts/read-file.sh "$TOKEN" <folder_share_id> "Marketing/plan.md" # 4. Create or update a file in a folder share scripts/upsert-file.sh "$TOKEN" <folder_share_id> "note.md" "# Content" # 5. List all files in a folder share scripts/list-files.sh "$TOKEN" <folder_share_id> # 6. Delete a file from a folder share scripts/delete-file.sh "$TOKEN" <folder_share_id> "old-note.md" # 7. Read a doc share (single document, share_id = doc_id) scripts/read.sh "$TOKEN" <share_id> # 8. Write to a doc share scripts/write.sh "$TOKEN" <share_id> <share_id> "# Updated content"
bash
curl -s -X POST "$RELAY_CP_URL/v1/auth/login" \
-H "Content-Type: application/json" \
-d '{"email": "'$RELAY_EMAIL'", "password": "'$RELAY_PASSWORD'"}' \bash
curl -s -X POST "$RELAY_CP_URL/v1/auth/login" \
-H "Content-Type: application/json" \
-d '{"email": "'$RELAY_EMAIL'", "password": "'$RELAY_PASSWORD'"}' \
| jq -r '.access_token'json
{
"access_token": "eyJ...",
"refresh_token": "...",
"token_type": "bearer",
"expires_in": 3600
}bash
curl -s -X POST "$RELAY_CP_URL/v1/auth/refresh" \
-H "Content-Type: application/json" \
-d '{"refresh_token": "'$REFRESH_TOKEN'"}'bash
curl -s -X POST "$RELAY_CP_URL/v1/auth/refresh" \
-H "Content-Type: application/json" \
-d '{"refresh_token": "'$REFRESH_TOKEN'"}'Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Read and write Obsidian notes stored in EVC Team Relay collaborative vault. Use when agent needs to: read note content from a shared Obsidian vault, create or update documents, list available shared folders and documents, or search across shared vault content. Relay stores documents as Yjs CRDTs; this skill provides a REST interface to read/write their text content. --- name: evc-team-relay description: > Read and write Obsidian notes stored in EVC Team Relay collaborative vault. Use when agent needs to: read note content from a shared Obsidian vault, create or update documents, list available shared folders and documents, or search across shared vault content. Relay stores documents as Yjs CRDTs; this skill provides a REST interface to read/write their text content. --- EVC Tea
REST API skill for reading and writing collaborative Obsidian vault documents via EVC Team Relay.
| Variable | Required | Description |
|----------|----------|-------------|
| RELAY_CP_URL | yes | Control plane URL, e.g. https://cp.your-domain.com |
| RELAY_EMAIL | yes | User email for authentication |
| RELAY_PASSWORD | yes | User password |
# 1. Authenticate — get a JWT token
TOKEN=$(scripts/auth.sh)
# 2. List shares to find available documents
scripts/list-shares.sh "$TOKEN"
# 3. Read a file from a folder share BY PATH (most common)
scripts/read-file.sh "$TOKEN" <folder_share_id> "Marketing/plan.md"
# 4. Create or update a file in a folder share
scripts/upsert-file.sh "$TOKEN" <folder_share_id> "note.md" "# Content"
# 5. List all files in a folder share
scripts/list-files.sh "$TOKEN" <folder_share_id>
# 6. Delete a file from a folder share
scripts/delete-file.sh "$TOKEN" <folder_share_id> "old-note.md"
# 7. Read a doc share (single document, share_id = doc_id)
scripts/read.sh "$TOKEN" <share_id>
# 8. Write to a doc share
scripts/write.sh "$TOKEN" <share_id> <share_id> "# Updated content"
| | Doc share | Folder share |
|--|-----------|--------------|
| Contains | Single document | Multiple files |
| doc_id | Same as share_id | Each file has its own doc_id (in folder metadata) |
| Read | read.sh <token> <share_id> | read-file.sh <token> <share_id> "path/to/file.md" |
| Write | write.sh <token> <share_id> <share_id> <content> | upsert-file.sh <token> <share_id> "path" <content> |
| Delete | N/A | delete-file.sh <token> <share_id> "path" |
Most shares are folder shares. Use read-file.sh and upsert-file.sh — they handle path resolution automatically.
Warning:
write.shdoes NOT work for folder shares — it writes content but does not register the file in folder metadata, so Obsidian will never see it. The script detects folder shares and refuses with an error.
| Script | Purpose | Args |
|--------|---------|------|
| auth.sh | Get JWT token | — |
| list-shares.sh | List all shares | <token> |
| list-files.sh | List files in folder share | <token> <share_id> |
| read-file.sh | Read file by path (folder share) | <token> <share_id> <file_path> |
| read.sh | Read by doc_id (low-level) | <token> <share_id> [doc_id] |
| upsert-file.sh | Create/update file (folder share) | <token> <share_id> <file_path> <content> |
| write.sh | Write by doc_id (doc shares only) | <token> <share_id> <doc_id> <content> |
| delete-file.sh | Delete file from folder share | <token> <share_id> <file_path> |
| create-file.sh | Create new file (low-level) | <token> <share_id> <file_path> <content> |
Bold = recommended for most use cases.
All API calls require a Bearer JWT token. Get one via login:
curl -s -X POST "$RELAY_CP_URL/v1/auth/login" \
-H "Content-Type: application/json" \
-d '{"email": "'$RELAY_EMAIL'", "password": "'$RELAY_PASSWORD'"}' \
| jq -r '.access_token'
Response:
{
"access_token": "eyJ...",
"refresh_token": "...",
"token_type": "bearer",
"expires_in": 3600
}
Use the access_token as Authorization: Bearer <token> header on all subsequent requests.
When the token expires (1 hour), refresh it:
curl -s -X POST "$RELAY_CP_URL/v1/auth/refresh" \
-H "Content-Type: application/json" \
-d '{"refresh_token": "'$REFRESH_TOKEN'"}'
Shares are the access units — each share maps to a document or folder in the Obsidian vault.
curl -s "$RELAY_CP_URL/v1/shares" \
-H "Authorization: Bearer $TOKEN" | jq
Response (array):
[
{
"id": "a1b2c3d4-...",
"kind": "doc",
"path": "Projects/meeting-notes.md",
"visibility": "private",
"is_owner": true,
"user_role": null,
"web_published": false
},
{
"id": "e5f6g7h8-...",
"kind": "folder",
"path": "Projects/",
"visibility": "private",
"is_owner": false,
"user_role": "editor"
}
]
Key fields:
id — share UUID, used as share_id in all operationskind — doc (single file) or folder (directory)path — Obsidian vault-relative pathuser_role — viewer (read-only), editor (read-write), or null (owner)Filter options: ?kind=doc, ?owned_only=true, ?member_only=true, ?skip=0&limit=50.
scripts/list-files.sh "$TOKEN" <share_id>
Response:
{
"doc_id": "e5f6g7h8-...",
"files": {
"meeting-notes.md": {"doc_id": "abc123-...", "type": "markdown"},
"project-plan.md": {"doc_id": "def456-...", "type": "markdown"}
}
}
Each key is the file's path within the folder. The doc_id field is the document identifier used for content operations. The share_id for content requests is always the folder share's ID.
Note: The API response uses
idas the field name. This is the same asdoc_id— use it whereverdoc_idis needed.
scripts/read-file.sh "$TOKEN" <folder_share_id> "Marketing/plan.md"
This resolves the path to a doc_id internally and returns:
{
"doc_id": "abc123-...",
"content": "# Marketing Plan\n\nContent here...",
"format": "text",
"path": "Marketing/plan.md"
}
scripts/read.sh "$TOKEN" <share_id> [doc_id] [key]
For doc shares, omit doc_id (defaults to share_id). For folder shares, pass the file's doc_id from list-files.sh.
# Create or update — auto-detects which operation is needed
scripts/upsert-file.sh "$TOKEN" <folder_share_id> "note.md" "# Updated content"
# Pipe content from stdin
echo "# Content" | scripts/upsert-file.sh "$TOKEN" <folder_share_id> "note.md" -
Response includes an operation field: "created" or "updated".
scripts/write.sh "$TOKEN" <share_id> <share_id> "# Updated Notes"
write.sh refuses folder shares — if you accidentally pass a folder share_id as doc_id, it detects this and exits with an error directing you to upsert-file.sh.
# If you know the folder share_id:
scripts/read-file.sh "$TOKEN" <folder_share_id> "Marketing/docs/plan.md"
# If you need to find the share first:
scripts/list-shares.sh "$TOKEN" # find the folder share
scripts/read-file.sh "$TOKEN" <share_id> "path/to/file.md"
# Always works, whether the file exists or not
scripts/upsert-file.sh "$TOKEN" <folder_share_id> "note.md" "# Content"
scripts/delete-file.sh "$TOKEN" <folder_share_id> "old-note.md"
| Status | Meaning | |--------|---------| | 400 | Invalid share_id format | | 401 | Missing or expired token — re-authenticate | | 403 | Insufficient permissions (viewer trying to write, or non-member) | | 404 | Share or file not found (check path spelling, use list-files.sh to verify) | | 422 | Missing required field (share_id, content) | | 502 | Relay server unavailable — retry later |
| Term | Meaning |
|------|---------|
| share_id | UUID of a share (doc or folder). Used for ACL checks in all requests. |
| doc_id | UUID of an individual document. For doc shares, equals share_id. For folder shares, each file has its own doc_id. |
| id | Same as doc_id — the API response field name. Use interchangeably. |
| file_path | Relative path within a folder share (e.g. "Marketing/plan.md"). |
references/api.md — full API reference with all endpointsMachine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
ready
Auth
api_key
Streaming
No
Data region
global
Protocol support
Requires: openclew, lang:typescript
Forbidden: none
Guardrails
Operational confidence: medium
curl -s "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/snapshot"
curl -s "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract"
curl -s "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "ready",
"authModes": [
"api_key"
],
"requires": [
"openclew",
"lang:typescript"
],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": "https://github.com/entire-vc/evc-team-relay-openclaw-skill#input",
"outputSchemaRef": "https://github.com/entire-vc/evc-team-relay-openclaw-skill#output",
"dataRegion": "global",
"contractUpdatedAt": "2026-02-24T19:41:18.710Z",
"sourceUpdatedAt": "2026-02-24T19:41:18.710Z",
"freshnessSeconds": 4441259
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T05:22:17.899Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Entire Vc",
"href": "https://github.com/entire-vc/evc-team-relay-openclaw-skill",
"sourceUrl": "https://github.com/entire-vc/evc-team-relay-openclaw-skill",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-24T19:43:14.176Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-24T19:41:18.710Z",
"isPublic": true
},
{
"factKey": "auth_modes",
"category": "compatibility",
"label": "Auth modes",
"value": "api_key",
"href": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:41:18.710Z",
"isPublic": true
},
{
"factKey": "schema_refs",
"category": "artifact",
"label": "Machine-readable schemas",
"value": "OpenAPI or schema references published",
"href": "https://github.com/entire-vc/evc-team-relay-openclaw-skill#input",
"sourceUrl": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:41:18.710Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/entire-vc-evc-team-relay-openclaw-skill/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to evc-team-relay and adjacent AI workflows.