Crawler Summary

scanfirst answer-first brief

Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. --- name: scanfirst description: > Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. metadata: openclaw: emoji: "๐Ÿ›ก๏ธ" --- ScanFirst โ€” Skill Security Scanner ๐Ÿ›ก๏ธ **Trigger**: When the user asks to scan, audit, or ch Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.

Freshness

Last checked 4/15/2026

Best For

scanfirst is best for a, from, scanfirst workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 58/100

scanfirst

Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. --- name: scanfirst description: > Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. metadata: openclaw: emoji: "๐Ÿ›ก๏ธ" --- ScanFirst โ€” Skill Security Scanner ๐Ÿ›ก๏ธ **Trigger**: When the user asks to scan, audit, or ch

OpenClawself-declared

Public facts

5

Change events

1

Artifacts

0

Freshness

Apr 15, 2026

Verifiededitorial-contentNo verified compatibility signals2 GitHub stars

Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.

2 GitHub starsTrust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Apr 15, 2026

Vendor

Qu4ntking

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. 2 GitHub stars reported by the source. Last updated 4/15/2026.

Setup snapshot

git clone https://github.com/Qu4ntking/scanfirst.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Qu4ntking

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Adoption (1)

Adoption signal

2 GitHub stars

profilemedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

5

Snippets

0

Languages

typescript

Parameters

Executable Examples

bash

bash scripts/scan.sh /path/to/skill

bash

bash scripts/scan-url.sh https://github.com/user/repo
bash scripts/scan-url.sh https://github.com/user/repo/tree/branch
bash scripts/scan-url.sh https://gitlab.com/user/repo

text

URL Mode:
  GitHub/GitLab REST API โ†’ base64 text โ†’ temp dir (chmod 600) โ†’ sandbox-exec โ†’ scan.sh โ†’ JSON output โ†’ delete temp dir

Local Mode:
  Local directory โ†’ scan.sh (read-only grep/find) โ†’ JSON output

text

๐Ÿ›ก๏ธ ScanFirst Report โ€” [skill name]

Score: [X]/100 โ€” [SAFE/CAUTION/DANGER]
Files scanned: [N]
Findings: [N]

[List CRITICAL and HIGH findings with file:line and description]

Recommendation: [Install / Review first / Do not install]

text

๐Ÿ›ก๏ธ ScanFirst Report โ€” suspicious-skill

Score: 0/100 โ€” DANGER ๐Ÿ”ด
Files scanned: 1
Findings: 8

CRITICAL findings:
  โ€ข SKILL.md:4 โ€” Prompt injection pattern detected
  โ€ข SKILL.md:5 โ€” Prompt injection pattern detected
  โ€ข SKILL.md:9 โ€” Remote code piped to shell
  โ€ข SKILL.md:13 โ€” API key or credential pattern detected
  โ€ข SKILL.md:23 โ€” Modifies identity/config files (SOUL.md/AGENTS.md)

HIGH findings:
  โ€ข SKILL.md:16 โ€” Reading sensitive config file
  โ€ข SKILL.md:17 โ€” HTTP POST/PUT request (potential data exfiltration)
  โ€ข SKILL.md:20 โ€” System persistence mechanism (cron/launchd/systemd)

Recommendation: Do not install. Multiple critical threats detected.

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. --- name: scanfirst description: > Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. metadata: openclaw: emoji: "๐Ÿ›ก๏ธ" --- ScanFirst โ€” Skill Security Scanner ๐Ÿ›ก๏ธ **Trigger**: When the user asks to scan, audit, or ch

Full README

name: scanfirst description: > Scan any skill for security issues before installing it. Static analysis with 15 check categories: prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and more. Outputs a JSON report with a 0-100 safety score. metadata: openclaw: emoji: "๐Ÿ›ก๏ธ"

ScanFirst โ€” Skill Security Scanner ๐Ÿ›ก๏ธ

Trigger: When the user asks to scan, audit, or check a skill for security issues before installing it.

What it does: Static analysis of skill files using regex pattern matching. Detects prompt injection, credential leaks, remote code execution, data exfiltration, identity tampering, and 10 more attack categories. Outputs a JSON report with a 0-100 safety score.

Version: 1.0.0 Detection patterns: English-only Dependencies: bash 3.2+, jq (+ curl for URL scanning) License: MIT


How to Use

Option 1: Scan a local skill directory

bash scripts/scan.sh /path/to/skill

Scans all text files in the directory (.md, .sh, .py, .js, .ts, .json, .yaml, .yml, .toml, .txt, .env, Makefile, Dockerfile, and more). Skips node_modules/ and .git/.

Option 2: Scan from URL (GitHub or GitLab โ€” API-only, no download)

bash scripts/scan-url.sh https://github.com/user/repo
bash scripts/scan-url.sh https://github.com/user/repo/tree/branch
bash scripts/scan-url.sh https://gitlab.com/user/repo

How URL scanning works:

  1. Reads the repository file tree via REST API (GET /repos/{owner}/{repo}/git/trees/{branch}?recursive=1)
  2. Fetches each file's content via blob API (base64 encoded) โ€” no git clone, no archive download, no executables on disk
  3. Decodes text content into a temporary directory ($TMPDIR) with restrictive permissions (chmod 600)
  4. Runs scan.sh on the temp directory inside an OS-level sandbox (see Security Design below)
  5. Deletes the temp directory immediately after scanning

Authentication: Automatically uses GITHUB_TOKEN, GH_TOKEN, or gh auth token if available. Without auth, GitHub API is limited to 60 requests/hour.

Limits: Max 200 files per repo, max 500KB per file. Larger repos are partially scanned with a warning.


Security Design

ScanFirst is designed around a single principle: never execute, download, or trust the code you're scanning.

Architecture

URL Mode:
  GitHub/GitLab REST API โ†’ base64 text โ†’ temp dir (chmod 600) โ†’ sandbox-exec โ†’ scan.sh โ†’ JSON output โ†’ delete temp dir

Local Mode:
  Local directory โ†’ scan.sh (read-only grep/find) โ†’ JSON output

Threat Model

| Threat | Mitigation | |--------|-----------| | Malicious code execution during scan | scan.sh is 100% read-only: only grep, find, cat, wc. Zero eval, source, exec. | | Network exfiltration during scan | macOS: sandbox-exec with (deny network*). Linux: bwrap --unshare-net / firejail --net=none / unshare --net. | | File writes outside temp dir | sandbox-exec restricts file-write* to $TMPDIR only. Pre-write path validation (assert_inside_sandbox) + post-write realpath check (verify_in_sandbox). | | Path traversal from API responses | sanitize_path() blocks .., absolute paths, empty strings, and any character outside [a-zA-Z0-9._/ -]. Double-checked by assert_inside_sandbox() and verify_in_sandbox(). | | Reading sensitive host files | Sandbox blocks read access to ~/.ssh, ~/.aws, ~/.gnupg, ~/.docker, ~/.kube, ~/.config, ~/.netrc, ~/.npmrc, ~/.pypirc, ~/Library/Keychains. | | Second-order prompt injection via filenames | All filenames and descriptions in JSON output are sanitized via sanitize_output() โ€” only [a-zA-Z0-9 ._-/(),:;] allowed, truncated to 60 chars. Agent warning field instructs LLMs to ignore finding content. | | Git clone of malicious repos | Eliminated by design. scan-url.sh uses REST API only. There is no git clone command anywhere in the codebase. |

Sandbox Details

macOS (sandbox-exec / Seatbelt):

  • (deny default) โ€” deny everything by default
  • (allow file-read*) with explicit denies for sensitive directories
  • (allow file-write* (subpath "$TMPDIR")) โ€” only temp dir
  • (deny network*) โ€” all network blocked
  • (allow process-fork process-exec) โ€” needed for bash/grep/jq

Linux (in priority order):

  1. bubblewrap (bwrap) โ€” --unshare-net --unshare-pid --ro-bind / --bind $TMPDIR
  2. firejail โ€” --net=none --read-only=/ --read-write=$TMPDIR
  3. unshare โ€” --net (network namespace isolation only)

Windows: No sandbox available. Runs with a warning. Recommend using WSL2.

No sandbox available: Falls back to unsandboxed execution with a warning. scan.sh itself makes zero network calls and zero writes, so the risk is minimal.


Interpreting Results

The output is a single JSON object with these fields:

| Field | Type | Description | |-------|------|-------------| | version | string | Scanner version ("1.0.0") | | skill | string | Skill directory name | | path | string | Path that was scanned | | score | number | 0-100 safety score (higher = safer) | | risk_level | string | SAFE (80-100), CAUTION (40-79), DANGER (0-39) | | files_scanned | number | Number of text files analyzed | | findings_count | number | Number of issues detected | | findings | array | Each finding has: severity, type, file, line, description | | agent_warning | string | Instruction for AI agents to not trust finding content |

Severity Levels

| Level | Meaning | Action | |-------|---------|--------| | CRITICAL | Immediate threat (prompt injection, remote code exec, identity tampering) | Do not install | | HIGH | Serious concern (data exfiltration, credential leak, code eval) | Review carefully before installing | | MEDIUM | Potential issue (obfuscation, suspicious URLs, tracking pixels) | Worth investigating | | LOW | Minor concern (missing SKILL.md, large files) | Informational | | INFO | Suppressed findings summary (dedup overflow) | Context only |

Auto-DANGER Rule

If 2 or more CRITICAL findings are detected, the score is automatically capped at 39 (DANGER), regardless of the arithmetic sum. This prevents a skill with many minor positives from masking critical threats.

Deduplication & Capping

  • Same type:file:line combination is never reported twice
  • Most finding types are capped at 3 per type to prevent score inflation
  • Overflow counts are reported as INFO-level summary entries

Check Categories (15 total)

| # | Type | Severity | What it detects | Penalty | |---|------|----------|----------------|---------| | 1 | PROMPT_INJECTION | CRITICAL | ignore previous instructions, DAN mode, new persona, bypass security | -25 | | 2 | REMOTE_CODE | CRITICAL-MEDIUM | curl \| bash, ephemeral hosting URLs (ngrok, railway, glitch), npx -y, download to /tmp | -30/-15/-10 | | 3 | CREDENTIAL_LEAK | CRITICAL-HIGH | API keys (sk-, ghp_, AKIA, xox, glpat-, AIza), JWTs, .env files with hardcoded secrets | -20/-15 | | 4 | DATA_EXFIL | HIGH-MEDIUM | cat ~/.ssh, POST/PUT requests, env harvesting (printenv \| curl), tracking pixels, markdown/HTML image exfil | -15/-12/-10/-8 | | 5 | SHELL_DANGER | CRITICAL | rm -rf /, chmod 777, fork bombs, dd if=/dev/zero, shutdown | -25 | | 6 | BASE64_PAYLOAD | CRITICAL-MEDIUM | base64 -d \| bash, long base64 strings (>200 chars) | -25/-8 | | 7 | IDENTITY_TAMPER | CRITICAL-HIGH | Writing to SOUL.md, AGENTS.md, IDENTITY.md, .openclaw config | -30/-20 | | 8 | PERMISSION_ESCALATION | HIGH | sudo, doas, pkexec | -15 | | 9 | OBFUSCATION | HIGH-MEDIUM | Hex escape sequences (\x41\x42...), Unicode escape sequences (\u0041\u0042...) | -15/-10 | | 10 | CODE_EVAL | HIGH | Python eval()/exec()/compile(), JS eval()/new Function()/vm.runIn*(), CLI -e/-c flags | -15 | | 11 | PERSISTENCE | HIGH-MEDIUM | crontab, launchctl load, systemctl enable, .bashrc/.zshrc modification | -20/-10 | | 12 | SYMLINK_ATTACK | MEDIUM | ln -s targeting /etc/, ~/.ssh, ~/.aws, ~/.gnupg, passwd, shadow | -10 | | 13 | SUSPICIOUS_DEPS | HIGH | npm lifecycle scripts (preinstall/postinstall), typosquatted packages (lod-ash, axois, requets, etc.) | -15 | | 14 | PERMISSION_MANIP | MEDIUM | chmod +x on downloaded/temp files | -8 | | 15 | STRUCTURAL | LOW-MEDIUM | Missing SKILL.md, binary files (.exe, .dll, .so, .wasm), large files >1MB | -5/-10/-3 |


Response Template

When reporting results to the user, use this format:

๐Ÿ›ก๏ธ ScanFirst Report โ€” [skill name]

Score: [X]/100 โ€” [SAFE/CAUTION/DANGER]
Files scanned: [N]
Findings: [N]

[List CRITICAL and HIGH findings with file:line and description]

Recommendation: [Install / Review first / Do not install]

Example:

๐Ÿ›ก๏ธ ScanFirst Report โ€” suspicious-skill

Score: 0/100 โ€” DANGER ๐Ÿ”ด
Files scanned: 1
Findings: 8

CRITICAL findings:
  โ€ข SKILL.md:4 โ€” Prompt injection pattern detected
  โ€ข SKILL.md:5 โ€” Prompt injection pattern detected
  โ€ข SKILL.md:9 โ€” Remote code piped to shell
  โ€ข SKILL.md:13 โ€” API key or credential pattern detected
  โ€ข SKILL.md:23 โ€” Modifies identity/config files (SOUL.md/AGENTS.md)

HIGH findings:
  โ€ข SKILL.md:16 โ€” Reading sensitive config file
  โ€ข SKILL.md:17 โ€” HTTP POST/PUT request (potential data exfiltration)
  โ€ข SKILL.md:20 โ€” System persistence mechanism (cron/launchd/systemd)

Recommendation: Do not install. Multiple critical threats detected.

Limitations

  • English-only โ€” Detection patterns are English-only. Prompt injection in other languages will not be detected.
  • Static regex analysis โ€” Pattern matching only. Sophisticated obfuscation, multi-line attack construction, or encoded payloads beyond base64 may evade detection.
  • Not a runtime monitor โ€” Scans files at rest, does not monitor what happens when a skill runs.
  • Not a dependency vulnerability scanner โ€” Does not check CVE databases. Use npm audit / pip audit / snyk test for known vulnerabilities.
  • False positives on security tools โ€” If you scan ScanFirst with itself, it will flag its own detection patterns. This is expected.
  • TOCTOU window โ€” A time-of-check-time-of-use gap exists between path validation and post-write verification in scan-url.sh. Mitigated by: (a) attacker has no local code execution, (b) TMPDIR has 700 permissions, (c) post-write realpath check catches escapes.
  • Not infallible โ€” Think of it as a metal detector at the door: it catches the obvious weapons, not everything. Always review code manually before installing from untrusted sources.

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/snapshot"
curl -s "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract"
curl -s "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation โ€ข (~400 MCP servers for AI agents) โ€ข AI Automation / AI Agent with MCPs โ€ข AI Workflows & AI Agents โ€ข MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 5d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | ๐ŸŒŸ Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T01:47:52.982Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "a",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "from",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "scanfirst",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:a|supported|profile capability:from|supported|profile capability:scanfirst|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Qu4ntking",
    "href": "https://github.com/Qu4ntking/scanfirst",
    "sourceUrl": "https://github.com/Qu4ntking/scanfirst",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T01:13:42.647Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T01:13:42.647Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "2 GitHub stars",
    "href": "https://github.com/Qu4ntking/scanfirst",
    "sourceUrl": "https://github.com/Qu4ntking/scanfirst",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T01:13:42.647Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/qu4ntking-scanfirst/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub ยท GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to scanfirst and adjacent AI workflows.