Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Build privacy-preserving smart contracts and dApps on Silent Data L2. Use when creating contracts with private read methods, private events, confidential ERC-20 (UCEF), compliant security tokens (UCEF3643), or deploying to Silent Data blockchain. Handles Hardhat deployment, ethers.js/viem integration, and private event consumption. --- name: silentdata-development description: Build privacy-preserving smart contracts and dApps on Silent Data L2. Use when creating contracts with private read methods, private events, confidential ERC-20 (UCEF), compliant security tokens (UCEF3643), or deploying to Silent Data blockchain. Handles Hardhat deployment, ethers.js/viem integration, and private event consumption. license: MIT metadata: author: appliedbl Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
silentdata-development is best for be, read, view workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Build privacy-preserving smart contracts and dApps on Silent Data L2. Use when creating contracts with private read methods, private events, confidential ERC-20 (UCEF), compliant security tokens (UCEF3643), or deploying to Silent Data blockchain. Handles Hardhat deployment, ethers.js/viem integration, and private event consumption. --- name: silentdata-development description: Build privacy-preserving smart contracts and dApps on Silent Data L2. Use when creating contracts with private read methods, private events, confidential ERC-20 (UCEF), compliant security tokens (UCEF3643), or deploying to Silent Data blockchain. Handles Hardhat deployment, ethers.js/viem integration, and private event consumption. license: MIT metadata: author: appliedbl
Public facts
4
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Seromenho
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/seromenho/silentdata-development.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Seromenho
Protocol compatibility
OpenClaw
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
bash
# For Hardhat deployment npm install @appliedblockchain/silentdatarollup-hardhat-plugin # For dApp development with ethers.js npm install @appliedblockchain/silentdatarollup-ethers-provider ethers@6 # For dApp development with viem npm install @appliedblockchain/silentdatarollup-viem viem
solidity
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.22;
import "@openzeppelin/contracts/token/ERC20/ERC20.sol";
contract PrivateToken is ERC20 {
error UnauthorizedBalanceQuery(address requester, address account);
constructor(
string memory name,
string memory symbol,
uint256 initialSupply
) ERC20(name, symbol) {
_mint(msg.sender, initialSupply);
}
// Only the account owner can view their balance
function balanceOf(address account) public view override returns (uint256) {
if (account != msg.sender) {
revert UnauthorizedBalanceQuery(msg.sender, account);
}
return super.balanceOf(account);
}
}solidity
// The standard PrivateEvent wrapper
event PrivateEvent(
address[] allowedViewers,
bytes32 indexed eventType,
bytes payload
);
// Define your event type hash (matches standard ERC-20 signature)
bytes32 public constant EVENT_TYPE_TRANSFER = keccak256("Transfer(address,address,uint256)");
// Emit a private event
function _emitPrivateTransfer(address from, address to, uint256 amount) internal {
address[] memory viewers = new address[](2);
viewers[0] = from;
viewers[1] = to;
emit PrivateEvent(
viewers,
EVENT_TYPE_TRANSFER,
abi.encode(from, to, amount)
);
}typescript
// hardhat.config.ts
import '@nomicfoundation/hardhat-ignition-ethers'
import '@appliedblockchain/silentdatarollup-hardhat-plugin'
const RPC_URL = process.env.RPC_URL
const PRIVATE_KEY = process.env.PRIVATE_KEY
if (!RPC_URL || !PRIVATE_KEY) {
throw new Error('RPC_URL and PRIVATE_KEY must be set in environment')
}
export default {
solidity: '0.8.22',
defaultNetwork: 'sdr',
networks: {
sdr: {
url: RPC_URL,
accounts: [PRIVATE_KEY],
silentdata: {}, // Enable Silent Data features
},
},
}typescript
// ignition/modules/PrivateToken.ts
import { buildModule } from '@nomicfoundation/hardhat-ignition/modules'
export default buildModule('PrivateToken', (m) => {
const name = m.getParameter('name', 'PrivateToken')
const symbol = m.getParameter('symbol', 'PTK')
const initialSupply = m.getParameter('initialSupply', 1000000n * 10n ** 18n)
const token = m.contract('PrivateToken', [name, symbol, initialSupply])
return { token }
})bash
npx hardhat ignition deploy ignition/modules/PrivateToken.ts --network sdr
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Build privacy-preserving smart contracts and dApps on Silent Data L2. Use when creating contracts with private read methods, private events, confidential ERC-20 (UCEF), compliant security tokens (UCEF3643), or deploying to Silent Data blockchain. Handles Hardhat deployment, ethers.js/viem integration, and private event consumption. --- name: silentdata-development description: Build privacy-preserving smart contracts and dApps on Silent Data L2. Use when creating contracts with private read methods, private events, confidential ERC-20 (UCEF), compliant security tokens (UCEF3643), or deploying to Silent Data blockchain. Handles Hardhat deployment, ethers.js/viem integration, and private event consumption. license: MIT metadata: author: appliedbl
Build privacy-preserving smart contracts and decentralized applications on Silent Data - a privacy-first Layer 2 blockchain built on Optimism.
Silent Data is different from standard EVM chains:
msg.sender in View Functions: Unlike standard EVM, msg.sender is available in eth_call when signed# For Hardhat deployment
npm install @appliedblockchain/silentdatarollup-hardhat-plugin
# For dApp development with ethers.js
npm install @appliedblockchain/silentdatarollup-ethers-provider ethers@6
# For dApp development with viem
npm install @appliedblockchain/silentdatarollup-viem viem
The key innovation: use msg.sender to restrict who can read data.
// SPDX-License-Identifier: MIT
pragma solidity ^0.8.22;
import "@openzeppelin/contracts/token/ERC20/ERC20.sol";
contract PrivateToken is ERC20 {
error UnauthorizedBalanceQuery(address requester, address account);
constructor(
string memory name,
string memory symbol,
uint256 initialSupply
) ERC20(name, symbol) {
_mint(msg.sender, initialSupply);
}
// Only the account owner can view their balance
function balanceOf(address account) public view override returns (uint256) {
if (account != msg.sender) {
revert UnauthorizedBalanceQuery(msg.sender, account);
}
return super.balanceOf(account);
}
}
How it works: When using the Silent Data provider, eth_call requests are signed, making msg.sender the caller's actual address. Unsigned requests via standard RPC assign a random address to msg.sender, preventing unauthorized access.
Emit events visible only to specified addresses:
// The standard PrivateEvent wrapper
event PrivateEvent(
address[] allowedViewers,
bytes32 indexed eventType,
bytes payload
);
// Define your event type hash (matches standard ERC-20 signature)
bytes32 public constant EVENT_TYPE_TRANSFER = keccak256("Transfer(address,address,uint256)");
// Emit a private event
function _emitPrivateTransfer(address from, address to, uint256 amount) internal {
address[] memory viewers = new address[](2);
viewers[0] = from;
viewers[1] = to;
emit PrivateEvent(
viewers,
EVENT_TYPE_TRANSFER,
abi.encode(from, to, amount)
);
}
See references/PRIVATE-EVENTS.md for detailed patterns.
// hardhat.config.ts
import '@nomicfoundation/hardhat-ignition-ethers'
import '@appliedblockchain/silentdatarollup-hardhat-plugin'
const RPC_URL = process.env.RPC_URL
const PRIVATE_KEY = process.env.PRIVATE_KEY
if (!RPC_URL || !PRIVATE_KEY) {
throw new Error('RPC_URL and PRIVATE_KEY must be set in environment')
}
export default {
solidity: '0.8.22',
defaultNetwork: 'sdr',
networks: {
sdr: {
url: RPC_URL,
accounts: [PRIVATE_KEY],
silentdata: {}, // Enable Silent Data features
},
},
}
// ignition/modules/PrivateToken.ts
import { buildModule } from '@nomicfoundation/hardhat-ignition/modules'
export default buildModule('PrivateToken', (m) => {
const name = m.getParameter('name', 'PrivateToken')
const symbol = m.getParameter('symbol', 'PTK')
const initialSupply = m.getParameter('initialSupply', 1000000n * 10n ** 18n)
const token = m.contract('PrivateToken', [name, symbol, initialSupply])
return { token }
})
npx hardhat ignition deploy ignition/modules/PrivateToken.ts --network sdr
import {
SilentDataRollupProvider,
SilentDataRollupContract,
} from '@appliedblockchain/silentdatarollup-ethers-provider'
// Initialize provider
const provider = new SilentDataRollupProvider({
rpcUrl: 'YOUR_RPC_URL',
privateKey: 'YOUR_PRIVATE_KEY',
})
// For contracts with private read methods
const contract = new SilentDataRollupContract({
address: '0x...',
abi: contractAbi,
runner: provider,
contractMethodsToSign: ['balanceOf'], // Methods that need signing
})
// Now balanceOf will work - msg.sender is available
const balance = await contract.balanceOf(myAddress)
import { createPublicClient, createWalletClient, defineChain } from 'viem'
import { privateKeyToAccount } from 'viem/accounts'
import { sdTransport } from '@appliedblockchain/silentdatarollup-viem'
const account = privateKeyToAccount('0x...')
const sdChain = defineChain({
id: 381185, // Testnet chain ID
name: 'Silent Data Testnet',
nativeCurrency: { name: 'Ether', symbol: 'ETH', decimals: 18 },
rpcUrls: { default: { http: ['YOUR_RPC_URL'] } },
})
const transport = sdTransport({
rpcUrl: 'YOUR_RPC_URL',
chainId: 381185,
privateKey: '0x...',
})
const publicClient = createPublicClient({ chain: sdChain, transport })
const walletClient = createWalletClient({ chain: sdChain, transport, account })
See references/DAPP.md for complete guide.
import {
SilentDataRollupProvider,
SDInterface,
} from '@appliedblockchain/silentdatarollup-ethers-provider'
const provider = new SilentDataRollupProvider({
rpcUrl: 'YOUR_RPC_URL',
privateKey: 'YOUR_PRIVATE_KEY',
})
// Get only private events you're allowed to see
const privateLogs = await provider.getPrivateLogs({
address: contractAddress,
fromBlock: 0,
toBlock: 'latest',
eventSignature: 'Transfer(address,address,uint256)', // Optional filter
})
// Decode the private events
const sdInterface = new SDInterface([
...contractAbi,
'event Transfer(address from, address to, uint256 value)',
])
for (const log of privateLogs) {
const parsed = sdInterface.parseLog(log)
if (parsed?.innerLog) {
const { from, to, value } = parsed.innerLog.args
console.log(`Private transfer: ${from} → ${to}: ${value}`)
}
}
| Network | Chain ID | RPC URL | | ------- | -------- | ------------------ | | Mainnet | 380929 | Get from dashboard | | Testnet | 381185 | Get from dashboard |
For production-ready confidential tokens, use UCEF (Unopinionated Confidential ERC-20 Framework):
import "../extensions/UCEFOwned.sol";
contract MyConfidentialToken is UCEFOwned {
constructor() UCEF("MyToken", "MTK") {}
function mint(address account, uint256 amount) public {
_mint(account, amount);
}
}
UCEF Extensions:
| Extension | Use Case |
| --------------- | ---------------------------------- |
| UCEFOwned | Only owner sees their balance |
| UCEFRegulated | Owner + regulator can see balances |
| UCEFSharable | Owner can grant viewing to others |
| UCEFPermit | EIP-2612 gasless approvals |
| UCEFVotes | Governance with private balances |
See references/UCEF.md for complete documentation.
For regulated security tokens that need both privacy and compliance, use UCEF3643:
import "./UCEF3643.sol";
// UCEF3643 combines:
// - UCEF privacy (confidential balances, private events)
// - ERC-3643 compliance (identity verification, transfer restrictions)
contract MySecurityToken is UCEF3643 {
// Inherits all privacy + compliance features
}
Key Features:
| Feature | Description | | --------------------- | ------------------------------------------ | | Confidential Balances | Only owner/identity can view balances | | Private Events | Transfer, Approval, Freeze events private | | Identity Registry | ERC-3643 identity verification | | Compliance Module | Modular compliance rules on transfers | | Auditor Role | Designated auditors see all private events | | Token Freezing | Freeze tokens for regulatory actions |
Auditor Management:
// Add/remove auditors (agents only)
function addAuditor(address account) external onlyAgent
function removeAuditor(address account) external onlyAgent
function setAuditors(address[] calldata newAuditors) external onlyAgent
See references/UCEF3643.md for complete documentation.
Use the template at assets/templates/PrivateToken.sol
Use the template at assets/templates/PrivateEvents.sol
modifier onlyOwnerCanRead() {
require(msg.sender == owner(), "Not authorized to read");
_;
}
function getSecretData() public view onlyOwnerCanRead returns (bytes memory) {
return _secretData;
}
function _emitToParties(address[] memory parties, bytes memory data) internal {
emit PrivateEvent(
parties,
EVENT_TYPE_NOTIFICATION,
data
);
}
⚠️ Never hardcode or paste private keys/API tokens in code
# .env (add to .gitignore!)
PRIVATE_KEY=0x...your_64_hex_chars...
RPC_URL=https://...
// Load from environment
const privateKey = process.env.PRIVATE_KEY
if (!privateKey?.startsWith('0x')) {
throw new Error('PRIVATE_KEY must be set with 0x prefix')
}
Ensure .gitignore includes:
.env
.env.local
*.key
Ask before running:
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/snapshot"
curl -s "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/contract"
curl -s "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/seromenho-silentdata-development/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/seromenho-silentdata-development/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/seromenho-silentdata-development/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-17T00:25:05.291Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "be",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "read",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "view",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "see",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "grant",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:be|supported|profile capability:read|supported|profile capability:view|supported|profile capability:see|supported|profile capability:grant|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Seromenho",
"href": "https://github.com/seromenho/silentdata-development",
"sourceUrl": "https://github.com/seromenho/silentdata-development",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T02:16:51.930Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T02:16:51.930Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/seromenho-silentdata-development/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to silentdata-development and adjacent AI workflows.