Crawler Summary

skill-guard-plus answer-first brief

Security scanner for ClawHub and Claude Code skills. Scans skills before installation to detect prompt injections, malware payloads, macOS supply chain attacks, data exfiltration, and more. Also audits existing installed skills (both OpenClaw and Claude Code/.claude/skills/). --- name: skill-guard-plus description: Security scanner for ClawHub and Claude Code skills. Scans skills before installation to detect prompt injections, malware payloads, macOS supply chain attacks, data exfiltration, and more. Also audits existing installed skills (both OpenClaw and Claude Code/.claude/skills/). --- skill-guard-plus — Agent Instructions **CRITICAL: This skill MUST be used for ALL skill installatio Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.

Freshness

Last checked 4/15/2026

Best For

skill-guard-plus is best for my, be, only workflows where MCP and OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 94/100

skill-guard-plus

Security scanner for ClawHub and Claude Code skills. Scans skills before installation to detect prompt injections, malware payloads, macOS supply chain attacks, data exfiltration, and more. Also audits existing installed skills (both OpenClaw and Claude Code/.claude/skills/). --- name: skill-guard-plus description: Security scanner for ClawHub and Claude Code skills. Scans skills before installation to detect prompt injections, malware payloads, macOS supply chain attacks, data exfiltration, and more. Also audits existing installed skills (both OpenClaw and Claude Code/.claude/skills/). --- skill-guard-plus — Agent Instructions **CRITICAL: This skill MUST be used for ALL skill installatio

MCPself-declared
OpenClawself-declared

Public facts

5

Change events

1

Artifacts

0

Freshness

Apr 15, 2026

Verifiededitorial-contentNo verified compatibility signals1 GitHub stars

Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.

1 GitHub starsTrust evidence available

Trust score

Unknown

Compatibility

MCP, OpenClaw

Freshness

Apr 15, 2026

Vendor

Hjl1045

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.

Setup snapshot

git clone https://github.com/hjl1045/skill-guard-plus.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Hjl1045

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

MCP, OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Adoption (1)

Adoption signal

1 GitHub stars

profilemedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

# In Claude Code project skills (preferred when running inside a project)
GUARD_SCRIPT=".claude/skills/skill-guard-plus/safe-install-plus.sh"

# In OpenClaw global install
GUARD_SCRIPT="$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh"

# Or via symlink
GUARD_SCRIPT="$HOME/.local/bin/safe-install-plus.sh"

bash

bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug>

bash

# Specific version
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug> --version 1.2.3

# Overwrite existing
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug> --force

# Static scan only (if uvx is not available)
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug> --skip-mcp

bash

# Install from zip with security scan
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --install-zip <path-to-zip>

# With force overwrite
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --install-zip <path-to-zip> --force

bash

bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --install-zip ~/Downloads/slack-v1.0.0.zip

bash

bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --scan-only <path-to-skill-directory>

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Security scanner for ClawHub and Claude Code skills. Scans skills before installation to detect prompt injections, malware payloads, macOS supply chain attacks, data exfiltration, and more. Also audits existing installed skills (both OpenClaw and Claude Code/.claude/skills/). --- name: skill-guard-plus description: Security scanner for ClawHub and Claude Code skills. Scans skills before installation to detect prompt injections, malware payloads, macOS supply chain attacks, data exfiltration, and more. Also audits existing installed skills (both OpenClaw and Claude Code/.claude/skills/). --- skill-guard-plus — Agent Instructions **CRITICAL: This skill MUST be used for ALL skill installatio

Full README

name: skill-guard-plus description: Security scanner for ClawHub and Claude Code skills. Scans skills before installation to detect prompt injections, malware payloads, macOS supply chain attacks, data exfiltration, and more. Also audits existing installed skills (both OpenClaw and Claude Code/.claude/skills/).

skill-guard-plus — Agent Instructions

CRITICAL: This skill MUST be used for ALL skill installations. Never run clawhub install directly.

When to Use This Skill

Use this skill when the user says any of the following:

  • "install this skill" (e.g. "帮我装一个 skill")
  • "add xxx skill" / "download xxx from ClawHub" (e.g. "从 ClawHub 下载 xxx")
  • "check if this skill is safe" (e.g. "帮我扫描一下这个 skill")
  • "scan my existing skills" (e.g. "审计一下我已装的 skills")
  • "scan my claude skills" (e.g. "扫描一下我的 Claude skills")
  • Any request involving clawhub install

Script Location

The scanner script can be in either location (check which exists):

# In Claude Code project skills (preferred when running inside a project)
GUARD_SCRIPT=".claude/skills/skill-guard-plus/safe-install-plus.sh"

# In OpenClaw global install
GUARD_SCRIPT="$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh"

# Or via symlink
GUARD_SCRIPT="$HOME/.local/bin/safe-install-plus.sh"

Use whichever path exists. Prefer the project-local .claude/skills/ path when available.

Core Workflow

Task A: Install a New Skill from ClawHub (CLI)

When the user asks to install a skill by name/slug (e.g. "install steipete/slack"):

Step 1: Run the safe installer (NEVER use clawhub install or npx clawhub@latest install directly):

bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug>

With options:

# Specific version
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug> --version 1.2.3

# Overwrite existing
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug> --force

# Static scan only (if uvx is not available)
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" <skill-slug> --skip-mcp

Step 2: Read the exit code and output:

  • Exit code 0 → Skill passed both scans and was installed. Tell the user: "✅ <skill-name> passed security scan and was installed successfully"
  • Exit code 1 → Error (missing dependencies, network issue). Show error to user and suggest fixes.
  • Exit code 2 → Security threats detected, skill was NOT installed. Tell the user: "⛔ Security issues detected, skill was NOT installed" and show the scan findings. Ask the user how they want to proceed:
    1. Review the flagged issues
    2. Install anyway (manual override): mv /tmp/skill-guard-staging/skills/<slug> ~/.openclaw/skills/
    3. Discard: rm -rf /tmp/skill-guard-staging/skills/<slug>

Step 3: If there were only warnings (yellow ⚠️) but no critical alerts (red 🚨), ask the user if they want to proceed.

Task A2: Install from Downloaded Zip

When the user has already downloaded a zip from ClawHub's "Download zip" button, or provides a zip file:

# Install from zip with security scan
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --install-zip <path-to-zip>

# With force overwrite
bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --install-zip <path-to-zip> --force

Example:

bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --install-zip ~/Downloads/slack-v1.0.0.zip

The script will:

  1. Extract zip to a temp staging area
  2. Auto-detect the skill name from the zip filename
  3. Find and scan all SKILL.md and script files inside
  4. Install to ~/.openclaw/skills/<skill-name>/ only if clean

Task B: Scan Existing Skills (Audit)

When the user asks to check/scan/audit installed skills:

Scan a single skill:

bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --scan-only <path-to-skill-directory>

Scan all installed skills:

for d in "$HOME/.openclaw/skills"/*/; do
    skill_name=$(basename "$d")
    if [ "$skill_name" = "skill-guard-plus" ]; then
        continue
    fi
    echo ""
    echo "========== Scanning: $skill_name =========="
    bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --scan-only "$d" --skip-mcp
done

Scan a specific file the user provides:

bash "$HOME/.openclaw/skills/skill-guard-plus/safe-install-plus.sh" --scan-only <path-to-file>

Task B2: Scan Claude Code Skills

When the user asks to scan/audit their Claude Code skills (.claude/skills/ directory):

Scan all Claude Code skills in a project:

bash ".claude/skills/skill-guard-plus/safe-install-plus.sh" --scan-claude /path/to/project --skip-mcp

Scan all Claude Code skills (auto-detect from current directory + home):

bash ".claude/skills/skill-guard-plus/safe-install-plus.sh" --scan-claude --skip-mcp

Scan a single Claude Code skill:

bash ".claude/skills/skill-guard-plus/safe-install-plus.sh" --scan-only .claude/skills/<skill-name>/ --skip-mcp

The --scan-claude flag will:

  1. Auto-discover .claude/skills/ directories (current project, home dir, and OpenClaw)
  2. Iterate through all skills (skipping skill-guard-plus itself)
  3. Run Layer 1 static scan on each skill
  4. Print a summary with total alerts/warnings and list any failed skills

Task C: First-Time Setup / Dependency Check

If the script fails because of missing dependencies, help the user install them:

# Check npx (ClawHub's official install method is: npx clawhub@latest install <slug>)
# npx comes with Node.js, so just need Node installed
if ! command -v npx &> /dev/null; then
    echo "npx not found. Install Node.js from https://nodejs.org"
fi

# Check uvx (needed for Layer 2 mcp-scan)
if ! command -v uvx &> /dev/null; then
    echo "uvx not found. Layer 2 (mcp-scan) will be skipped."
    echo "To enable full protection: curl -LsSf https://astral.sh/uv/install.sh | sh"
fi

Note: The script supports both npx clawhub@latest (official, preferred) and globally installed clawhub CLI as fallback. If uvx is not available, the script automatically falls back to Layer 1 only.

What the Scanner Detects

Layer 1: Static Pattern Scan (System-level attack detection)

  • curl | bash download-and-execute chains
  • base64 --decode obfuscation
  • xattr -c quarantine macOS Gatekeeper bypass
  • LaunchAgent/LaunchDaemon persistence mechanisms
  • Credential file access (.ssh, .aws, .env, API keys)
  • Tool/platform config file access (openclaw.json, credentials.json, token.json, keychain, .netrc)
  • Credential-like key names in code (botToken, apiKey, apiSecret, clientSecret, password, etc.)
  • Data exfiltration via POST/netcat
  • Covert data embedding in output (secrets hidden in HTML comments, formatted strings)
  • Commands hidden in HTML comments
  • Prompt injection keywords
  • Binary executable references (.exe, .dylib, .so, .mach-o)
  • Non-printable character hiding

Layer 2: mcp-scan AI Analysis (AI semantic analysis)

  • Semantic prompt injection detection (catches rephrased attacks)
  • Tool poisoning and cross-origin escalation
  • Rug pull detection
  • Hidden instruction analysis

Important Rules for the Agent

  1. NEVER run clawhub install directly — always route through safe-install-plus.sh
  2. NEVER skip both scan layers — at minimum Layer 1 must run
  3. NEVER auto-install a skill that has critical (🚨) alerts — always ask the user first
  4. Show specific flagged lines so the user can make an informed decision
  5. When in doubt, err on the side of caution — better to block a safe skill than install a malicious one
  6. Report results in English

Interpreting Scan Results

The scanner outputs raw alerts and warnings — but the agent's job is to interpret them in context, not just relay them. Individual warnings may look harmless, but certain combinations form attack chains that are far more dangerous than any single warning alone.

Warning Chain Analysis

After a scan completes, look at the warnings as a group and check for these patterns:

Credential Theft Chain (high risk — recommend NOT installing):

  • Config/credential file access + credential key extraction + data embedding in output
  • Example: reads openclaw.json → extracts botToken → embeds in HTML comment
  • This is a classic exfiltration pattern: the stolen data leaves the system when the user copies, shares, or publishes the skill's output.

Stealth Persistence Chain (high risk):

  • System directory references + chmod +x + crontab/LaunchAgent
  • The skill installs something and makes it survive reboots.

Download-and-Execute Chain (critical — scanner already flags this as ALERT):

  • curl/wget + base64 decode + eval/exec
  • Already caught by Layer 1 as CRITICAL, but if any of these appear as separate warnings, treat the combination as critical too.

How to Present Findings

When warnings are detected, the agent should:

  1. List each warning with the specific flagged line(s)
  2. Explain what each warning means in plain language (e.g., "This code reads the OpenClaw config file which contains your bot token")
  3. Identify chains — if multiple warnings form one of the patterns above, explicitly call it out: "These three warnings together form a credential theft chain"
  4. Give a clear recommendation: "I recommend NOT installing this skill because..." or "These warnings appear benign in context because..."
  5. Never say "All clear" if there are warnings — even if the script exits 0, the agent should present warnings with context and let the user decide

The goal: the user should understand what the code does and why it's risky, not just see a list of yellow flags they have to interpret themselves.

Common User Queries

  • "install xxx skill" → Task A (install with scan via clawhub)
  • "install xxx" → Task A
  • "I downloaded a zip" / "install this zip" → Task A2 (install from zip)
  • "is this skill safe?" → Task B (scan only)
  • "scan all my skills" → Task B (batch audit for OpenClaw) or Task B2 (Claude Code skills)
  • "scan my claude skills" / "扫描一下我的 Claude skills" → Task B2
  • "audit this project's skills" → Task B2 with project path
  • "clawhub install xxx" / "npx clawhub@latest install xxx" → Intercept! Use Task A instead
  • "why can't I install?" → Check Task C (dependencies)

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

MCP: self-declaredOpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/snapshot"
curl -s "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/contract"
curl -s "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITLAB_AI_CATALOGgitlab-mcp

Rank

83

A Model Context Protocol (MCP) server for GitLab

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_PUBLIC_PROJECTSgitlab-mcp

Rank

80

A Model Context Protocol (MCP) server for GitLab

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_AI_CATALOGrmcp-openapi

Rank

74

Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_AI_CATALOGrmcp-actix-web

Rank

72

An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)

Traction

No public download signal

Freshness

Updated 2d ago

MCP
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "MCP",
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-16T23:40:16.022Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "MCP",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "my",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "be",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "only",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "and",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "findings",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "bash",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "all",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "existing",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "a",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "claude",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "on",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "ai",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "layers",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "make",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "results",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "completes",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "via",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "both",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:MCP|unknown|profile protocol:OPENCLEW|unknown|profile capability:my|supported|profile capability:be|supported|profile capability:only|supported|profile capability:and|supported|profile capability:findings|supported|profile capability:bash|supported|profile capability:all|supported|profile capability:existing|supported|profile capability:a|supported|profile capability:claude|supported|profile capability:on|supported|profile capability:ai|supported|profile capability:layers|supported|profile capability:make|supported|profile capability:results|supported|profile capability:completes|supported|profile capability:via|supported|profile capability:both|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Hjl1045",
    "href": "https://github.com/hjl1045/skill-guard-plus",
    "sourceUrl": "https://github.com/hjl1045/skill-guard-plus",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T01:12:35.584Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "MCP, OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T01:12:35.584Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "1 GitHub stars",
    "href": "https://github.com/hjl1045/skill-guard-plus",
    "sourceUrl": "https://github.com/hjl1045/skill-guard-plus",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T01:12:35.584Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/hjl1045-skill-guard-plus/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to skill-guard-plus and adjacent AI workflows.