Crawler Summary

vega-ops answer-first brief

Server operations, shell execution, and deployment workflows for the Vega agent running on a Hetzner CX32 VPS with Docker + Tailscale. Use when Franz asks about server status, Docker container management, file operations on the VPS, Git/GitHub workflows, Claude Code delegation, security checks, or troubleshooting. Do NOT use for general knowledge questions, creative writing, or tasks unrelated to server infrastructure. Do NOT use for Telegram bot configuration (that lives in AGENTS.md and openclaw.json). --- name: vega-ops description: > Server operations, shell execution, and deployment workflows for the Vega agent running on a Hetzner CX32 VPS with Docker + Tailscale. Use when Franz asks about server status, Docker container management, file operations on the VPS, Git/GitHub workflows, Claude Code delegation, security checks, or troubleshooting. Do NOT use for general knowledge questions, creative writing, or tasks Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.

Freshness

Last checked 2/25/2026

Best For

vega-ops is best for delegate, review, be workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 89/100

vega-ops

Server operations, shell execution, and deployment workflows for the Vega agent running on a Hetzner CX32 VPS with Docker + Tailscale. Use when Franz asks about server status, Docker container management, file operations on the VPS, Git/GitHub workflows, Claude Code delegation, security checks, or troubleshooting. Do NOT use for general knowledge questions, creative writing, or tasks unrelated to server infrastructure. Do NOT use for Telegram bot configuration (that lives in AGENTS.md and openclaw.json). --- name: vega-ops description: > Server operations, shell execution, and deployment workflows for the Vega agent running on a Hetzner CX32 VPS with Docker + Tailscale. Use when Franz asks about server status, Docker container management, file operations on the VPS, Git/GitHub workflows, Claude Code delegation, security checks, or troubleshooting. Do NOT use for general knowledge questions, creative writing, or tasks

OpenClawself-declared

Public facts

4

Change events

1

Artifacts

0

Freshness

Feb 25, 2026

Verifiededitorial-contentNo verified compatibility signals

Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.

Trust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Feb 25, 2026

Vendor

Zandereins

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.

Setup snapshot

git clone https://github.com/Zandereins/openclaw-skill-vega-ops.git
  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Zandereins

profilemedium
Observed Feb 25, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Feb 25, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB OPENCLEW

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Parameters

Executable Examples

text

Host: your-server-hostname (Hetzner CX32, or your VPS provider)
OS:   Ubuntu 24.04 LTS
User: openclaw (UID 1000) โ€” never run as root unless explicitly required
VPN:  Tailscale 100.x.x.x (only access path)

bash

cd /home/openclaw/openclaw && docker compose ps

bash

# Before
   docker compose ps
   # Action
   docker compose restart openclaw-gateway
   # After
   docker compose ps

bash

wc -c < /home/openclaw/openclaw/.env

bash

# Status
docker compose ps                                    # Container status
docker compose logs openclaw-gateway --tail 30       # Recent logs
docker compose logs openclaw-gateway --tail 30 -f    # Live logs

# Lifecycle (๐ŸŸก requires approval)
docker compose restart openclaw-gateway              # Restart gateway
docker compose down && docker compose up -d          # Full restart
docker compose exec openclaw-gateway sh              # Shell into container

# Inside container
npx openclaw --version                               # Version check
npx openclaw security audit --deep                   # Security audit
npx openclaw cron list                               # Cron jobs
npx openclaw skills list                             # Loaded skills

bash

cd /home/openclaw/openclaw
git fetch --tags
git tag --sort=-v:refname | head -10    # Show available versions
# Franz picks a version
git checkout v2026.x.x
docker build -t openclaw:local .
docker compose down && docker compose up -d
# Verify
docker compose logs openclaw-gateway --tail 10

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB OPENCLEW

Docs source

GITHUB OPENCLEW

Editorial quality

ready

Server operations, shell execution, and deployment workflows for the Vega agent running on a Hetzner CX32 VPS with Docker + Tailscale. Use when Franz asks about server status, Docker container management, file operations on the VPS, Git/GitHub workflows, Claude Code delegation, security checks, or troubleshooting. Do NOT use for general knowledge questions, creative writing, or tasks unrelated to server infrastructure. Do NOT use for Telegram bot configuration (that lives in AGENTS.md and openclaw.json). --- name: vega-ops description: > Server operations, shell execution, and deployment workflows for the Vega agent running on a Hetzner CX32 VPS with Docker + Tailscale. Use when Franz asks about server status, Docker container management, file operations on the VPS, Git/GitHub workflows, Claude Code delegation, security checks, or troubleshooting. Do NOT use for general knowledge questions, creative writing, or tasks

Full README

name: vega-ops description: > Server operations, shell execution, and deployment workflows for the Vega agent running on a Hetzner CX32 VPS with Docker + Tailscale. Use when Franz asks about server status, Docker container management, file operations on the VPS, Git/GitHub workflows, Claude Code delegation, security checks, or troubleshooting. Do NOT use for general knowledge questions, creative writing, or tasks unrelated to server infrastructure. Do NOT use for Telegram bot configuration (that lives in AGENTS.md and openclaw.json). emoji: ๐Ÿ›ฐ๏ธ metadata: openclaw: triggers: [server, docker, vps, deployment, shell, exec, delegate, claude, git, github, security, firewall, ssh, tailscale, container, logs, health, diagnostic, troubleshoot, workflow]

Vega Ops

Operational playbook for Vega on the OpenClaw VPS. Covers shell execution, Docker management, path conventions, security, Claude Code delegation, Git workflows, and troubleshooting.

When to use this skill

Use when:

  • Franz asks to check server status, disk, memory, or processes
  • Any Docker container operation (restart, logs, exec, build)
  • File read/write/edit on the VPS filesystem
  • Git operations (status, commit, push, pull)
  • Claude Code delegation tasks (sync or async)
  • Security audits, firewall checks, Tailscale diagnostics
  • OpenClaw updates or configuration changes
  • Troubleshooting server issues

Don't use when:

  • General conversation or knowledge questions
  • Telegram bot personality/behavior (โ†’ SOUL.md, AGENTS.md)
  • LLM provider or model configuration (โ†’ openclaw.json)
  • Skill development for other skills (โ†’ skill-creator)

1. Environment Overview

Host: your-server-hostname (Hetzner CX32, or your VPS provider)
OS:   Ubuntu 24.04 LTS
User: openclaw (UID 1000) โ€” never run as root unless explicitly required
VPN:  Tailscale 100.x.x.x (only access path)

Key directories

| Purpose | Host path | Container path | |---------|-----------|----------------| | Docker Compose | /home/openclaw/openclaw/ | โ€” | | OpenClaw config | /home/openclaw/.openclaw/ | /home/node/.openclaw/ | | Workspace | /home/openclaw/.openclaw/workspace/ | /home/node/.openclaw/workspace/ | | Skills | /home/openclaw/.openclaw/workspace/skills/ | /home/node/.openclaw/workspace/skills/ | | Sessions | /home/openclaw/.openclaw/agents/main/sessions/ | /home/node/.openclaw/agents/main/sessions/ | | Claude Code wrapper | /home/openclaw/claude-task | โ€” (host only) | | CLAUDE.md | /home/openclaw/CLAUDE.md | โ€” (host only) |

Critical rule: Always distinguish host paths (/home/openclaw/...) from container paths (/home/node/...). Tool calls from inside the OpenClaw container see /home/node/ โ€” not /home/openclaw/. When writing AGENTS.md rules or exec commands, specify which context the path applies to.


2. Shell Execution โ€” Safety First

The 3-tier control model

Every shell action falls into one of three tiers:

| Tier | Label | Examples | Behavior | |------|-------|----------|----------| | ๐ŸŸข Green | Free | ls, cat, docker ps, git status, df -h, tailscale status | Execute immediately | | ๐ŸŸก Yellow | 4-eyes | docker compose restart, git push, config edits, file writes | Ask Franz for approval first | | ๐Ÿ”ด Red | Forbidden | rm -rf, disk format, firewall disable, credential exposure | Never execute, warn Franz |

Shell best practices

  1. Always cd first. Docker Compose commands require the compose directory:

    cd /home/openclaw/openclaw && docker compose ps
    
  2. Prefer read-only commands. Start with status/info before modifying anything.

  3. One command per step. Don't chain destructive commands. Each step should be independently verifiable.

  4. Log before and after. When making changes, capture state before and after:

    # Before
    docker compose ps
    # Action
    docker compose restart openclaw-gateway
    # After
    docker compose ps
    
  5. Never expose secrets. Don't cat or echo files containing tokens, API keys, or passwords. If you need to verify a token exists, check file presence or length:

    wc -c < /home/openclaw/openclaw/.env
    
  6. Use sudo sparingly. The openclaw user has Docker group access. System-level commands (ufw, systemctl, apt) may need sudo โ€” always note this to Franz.


3. Docker Operations

Common commands (from /home/openclaw/openclaw/)

# Status
docker compose ps                                    # Container status
docker compose logs openclaw-gateway --tail 30       # Recent logs
docker compose logs openclaw-gateway --tail 30 -f    # Live logs

# Lifecycle (๐ŸŸก requires approval)
docker compose restart openclaw-gateway              # Restart gateway
docker compose down && docker compose up -d          # Full restart
docker compose exec openclaw-gateway sh              # Shell into container

# Inside container
npx openclaw --version                               # Version check
npx openclaw security audit --deep                   # Security audit
npx openclaw cron list                               # Cron jobs
npx openclaw skills list                             # Loaded skills

OpenClaw update workflow (๐ŸŸก requires approval)

cd /home/openclaw/openclaw
git fetch --tags
git tag --sort=-v:refname | head -10    # Show available versions
# Franz picks a version
git checkout v2026.x.x
docker build -t openclaw:local .
docker compose down && docker compose up -d
# Verify
docker compose logs openclaw-gateway --tail 10

Container path awareness

When using docker compose exec to run commands inside the container, remember:

  • Config lives at /home/node/.openclaw/openclaw.json (not /home/openclaw/)
  • Workspace is at /home/node/.openclaw/workspace/
  • Skills dir is at /home/node/.openclaw/workspace/skills/
  • The container runs as node user, not openclaw

4. Claude Code Delegation

Vega can delegate coding tasks to Claude Code running on the host.

Synchronous delegation (default)

Use for tasks that complete in under 2 minutes:

exec command:"claude -p 'Task description here'" elevated:true timeout:120
  • Direct result return โ€” no monitoring needed
  • No bash, no pty, no background
  • This is the default mode for all delegations

Asynchronous delegation (only on Franz's explicit request)

For long-running tasks only when Franz specifically asks:

exec command:"claude 'Long task description'" background:true elevated:true
  • Returns a sessionId for monitoring
  • Only use when Franz explicitly says "async" or "background"

The claude-task wrapper

For tasks that need PTY allocation (interactive Claude Code sessions):

/home/openclaw/claude-task "Task description"

This wrapper uses the script command to force PTY allocation, which Claude Code requires for API authentication when called from non-interactive contexts.

Delegation rules

  1. Always synchronous by default โ€” never background without Franz asking
  2. Report results directly โ€” show Claude Code's output, don't summarize
  3. Path awareness โ€” Claude Code runs on the host, so use host paths
  4. One task at a time โ€” don't stack multiple delegations

5. Git & GitHub Workflows

Status checks (๐ŸŸข free)

cd /home/openclaw/.openclaw/workspace && git status
cd /home/openclaw/.openclaw/workspace && git log --oneline -5
cd /home/openclaw/.openclaw/workspace && git diff --stat

Workspace backup push (๐ŸŸก requires approval)

cd /home/openclaw/.openclaw/workspace
git add -A
git commit -m "Descriptive commit message"
git push origin main

ShieldClaw repo operations (๐ŸŸก requires approval)

cd /home/openclaw/shieldclaw
git status
git add -A
git commit -m "Message"
git push origin main

GitHub CLI

gh repo list --limit 10
gh repo view yourusername/openclaw-workspace

Rules

  • Never force push (git push --force) without explicit approval
  • Always show diff before commit so Franz can review
  • Commit messages should be descriptive โ€” no "update" or "fix"
  • Separate workspace and skill repo operations โ€” don't mix

6. Security Checks

Quick health check (๐ŸŸข free)

# System
uptime && df -h / && free -h

# Network
tailscale status
sudo ufw status verbose

# Docker
cd /home/openclaw/openclaw && docker compose ps

# OpenClaw security
cd /home/openclaw/openclaw && docker compose exec openclaw-gateway npx openclaw security audit --deep

Tailscale diagnostics

tailscale status              # Connected devices
tailscale netcheck            # Network quality
tailscale ping 100.x.x.x  # Self-ping (latency check)

SSH verification

# Verify public IP is blocked
ss -tlnp | grep 22                           # Should only show sshd
sudo ufw status | grep -i "deny (incoming)"  # Should be default deny

Security principles

  • Tailscale is the only ingress โ€” public IP is fully blocked by UFW
  • SSH only via Tailscale โ€” PasswordAuthentication is disabled
  • Elevated access is restricted โ€” only the owner's Telegram ID (YOUR_TELEGRAM_ID)
  • ShieldClaw is active โ€” prompt injection defense on all inputs
  • Secrets stay on server โ€” never send tokens, keys, or passwords via Telegram

7. Troubleshooting Playbook

Known issues and fixes

Token mismatch after changes:

grep OPENCLAW_GATEWAY_TOKEN /home/openclaw/openclaw/.env
docker compose exec openclaw-gateway sh -c 'grep "\"token\"" /home/node/.openclaw/openclaw.json'
# โ†’ Must be identical

Dashboard "pairing required" error: โ†’ Use SSH tunnel (localhost), not Tailscale IP directly. WebCrypto needs secure context (HTTPS or localhost).

Telegram "401: Unauthorized": โ†’ Bot token revoked or expired. Get new token from @BotFather, update in openclaw.json under channels.telegram.botToken.

Container can't reach localhost services: โ†’ Use service name (openclaw-gateway) instead of localhost for inter-container communication.

Claude Code PTY errors: โ†’ Use the claude-task wrapper at /home/openclaw/claude-task which forces PTY allocation via the script command.

Empty environment variables blocking auth: โ†’ Check for empty CLAUDE_* variables that override valid auth:

env | grep CLAUDE_
# Remove empty ones from .bashrc or .env

Skill not loading after deploy: โ†’ Verify SKILL.md frontmatter has --- delimiters and name/description fields. Compare with a working skill:

docker compose exec openclaw-gateway head -5 /app/skills/healthcheck/SKILL.md

Diagnostic sequence for unknown issues

  1. Check container status: docker compose ps
  2. Read recent logs: docker compose logs openclaw-gateway --tail 50
  3. Check disk space: df -h /
  4. Check memory: free -h
  5. Check Tailscale: tailscale status
  6. Run security audit: npx openclaw security audit --deep (inside container)
  7. Report findings to Franz with specific error messages

8. Artifacts and Output Handling

When producing files or reports for Franz:

  • Write outputs to the workspace (/home/openclaw/.openclaw/workspace/) โ€” this is the backed-up, persistent storage
  • Use meaningful filenames โ€” security-audit-2026-02-12.md, not output.txt
  • For temporary work, use /tmp/ โ€” it gets cleaned on restart
  • For skill development, write to workspace/skills/<skill-name>/
  • Always confirm file creation with Franz โ€” show the path and a preview

9. Operational Checklists

Daily health check (can be automated via HEARTBEAT.md)

  1. Container running? โ†’ docker compose ps
  2. Disk usage < 80%? โ†’ df -h /
  3. Memory available? โ†’ free -h
  4. Tailscale connected? โ†’ tailscale status
  5. No critical security findings? โ†’ security audit

Before any config change

  1. Create backup: cp openclaw.json openclaw.json.bak.$(date +%s)
  2. Show Franz the planned change
  3. Wait for approval
  4. Apply change
  5. Restart if needed: docker compose restart openclaw-gateway
  6. Verify: check logs + test via Telegram

After OpenClaw update

  1. Check version: npx openclaw --version (in container)
  2. Verify skills loaded: npx openclaw skills list
  3. Run security audit
  4. Test Telegram connectivity
  5. Push workspace backup if config changed

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB OPENCLEW

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/snapshot"
curl -s "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/contract"
curl -s "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation โ€ข (~400 MCP servers for AI agents) โ€ข AI Automation / AI Agent with MCPs โ€ข AI Workflows & AI Agents โ€ข MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | ๐ŸŒŸ Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_OPENCLEW",
      "generatedAt": "2026-04-17T02:18:25.462Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "delegate",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "review",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "be",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:delegate|supported|profile capability:review|supported|profile capability:be|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Zandereins",
    "href": "https://github.com/Zandereins/openclaw-skill-vega-ops",
    "sourceUrl": "https://github.com/Zandereins/openclaw-skill-vega-ops",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-25T02:23:47.290Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-02-25T02:23:47.290Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/zandereins-openclaw-skill-vega-ops/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub ยท GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to vega-ops and adjacent AI workflows.