{
  "schemaVersion": "1.0",
  "item": {
    "slug": "aegis-security-hackathon",
    "name": "Hackathon",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/SwiftAdviser/aegis-security-hackathon",
    "canonicalUrl": "https://clawhub.ai/SwiftAdviser/aegis-security-hackathon",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/aegis-security-hackathon",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=aegis-security-hackathon",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md",
      "package.json"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/aegis-security-hackathon"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/aegis-security-hackathon",
    "agentPageUrl": "https://openagent3.xyz/skills/aegis-security-hackathon/agent",
    "manifestUrl": "https://openagent3.xyz/skills/aegis-security-hackathon/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/aegis-security-hackathon/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Aegis402 Shield Protocol (Hackathon/Testnet)",
        "body": "Blockchain security API for AI agents. Testnet version - pay with Base Sepolia USDC.\n\n⚠️ This is the hackathon/testnet deployment. For production, use aegis-security."
      },
      {
        "title": "Skill Files",
        "body": "FileURLSKILL.md (this file)https://hackathon.aegis402.xyz/skill.mdpackage.json (metadata)https://hackathon.aegis402.xyz/skill.json\n\nBase URL: https://hackathon.aegis402.xyz/v1"
      },
      {
        "title": "Quick Start",
        "body": "npm install @x402/fetch @x402/evm\n\nimport { x402Client, wrapFetchWithPayment } from '@x402/fetch';\nimport { ExactEvmScheme } from '@x402/evm/exact/client';\n\nconst client = new x402Client()\n  .register('eip155:*', new ExactEvmScheme(yourEvmWallet));\n\nconst fetch402 = wrapFetchWithPayment(fetch, client);\n\n// Payments on Base Sepolia (testnet USDC)\nconst res = await fetch402('https://hackathon.aegis402.xyz/v1/check-token/0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48?chain_id=1');\nconst data = await res.json();\n\nRequirements: Testnet USDC on Base Sepolia (chain ID 84532)\n\nGet testnet USDC: Base Sepolia Faucet"
      },
      {
        "title": "Pricing (Testnet USDC)",
        "body": "EndpointPriceUse CasePOST /simulate-tx$0.05Transaction simulation, DeFi safetyGET /check-token/:address$0.01Token honeypot detectionGET /check-address/:address$0.005Address reputation check"
      },
      {
        "title": "Check Token ($0.01)",
        "body": "Scan any token for honeypots, scams, and risks.\n\ncurl \"https://hackathon.aegis402.xyz/v1/check-token/0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48?chain_id=1\"\n\nResponse:\n\n{\n  \"address\": \"0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48\",\n  \"isHoneypot\": false,\n  \"trustScore\": 95,\n  \"risks\": [],\n  \"_meta\": { \"requestId\": \"uuid\", \"duration\": 320 }\n}"
      },
      {
        "title": "Check Address ($0.005)",
        "body": "Verify if address is flagged for phishing or poisoning.\n\ncurl \"https://hackathon.aegis402.xyz/v1/check-address/0x742d35Cc6634C0532925a3b844Bc454e4438f44e\"\n\nResponse:\n\n{\n  \"address\": \"0x742d35Cc6634C0532925a3b844Bc454e4438f44e\",\n  \"isPoisoned\": false,\n  \"reputation\": \"NEUTRAL\",\n  \"tags\": [\"wallet\", \"established\"],\n  \"_meta\": { \"requestId\": \"uuid\", \"duration\": 180 }\n}"
      },
      {
        "title": "Simulate Transaction ($0.05)",
        "body": "Predict balance changes and detect threats before signing.\n\ncurl -X POST \"https://hackathon.aegis402.xyz/v1/simulate-tx\" \\\n  -H \"Content-Type: application/json\" \\\n  -d '{\n    \"from\": \"0xYourWallet...\",\n    \"to\": \"0xContract...\",\n    \"value\": \"1000000000000000000\",\n    \"data\": \"0x...\",\n    \"chain_id\": 8453\n  }'\n\nResponse:\n\n{\n  \"isSafe\": true,\n  \"riskLevel\": \"LOW\",\n  \"simulation\": {\n    \"balanceChanges\": [\n      { \"asset\": \"USDC\", \"amount\": \"-100.00\", \"address\": \"0x...\" }\n    ]\n  },\n  \"warnings\": [],\n  \"_meta\": { \"requestId\": \"uuid\", \"duration\": 450 }\n}"
      },
      {
        "title": "x402 Payment Flow (Testnet)",
        "body": "Agent calls any paid endpoint\nReceives 402 Payment Required with Base Sepolia payment instructions\nPays testnet USDC on Base Sepolia (chain ID: 84532)\nRetries request with payment proof header\nGets security scan result\n\nNetwork: Base Sepolia (eip155:84532)\nCurrency: Testnet USDC"
      },
      {
        "title": "Before Swapping Tokens",
        "body": "const tokenCheck = await fetch402(`https://hackathon.aegis402.xyz/v1/check-token/${tokenAddress}?chain_id=8453`);\nconst { isHoneypot, trustScore } = await tokenCheck.json();\n\nif (isHoneypot || trustScore < 50) {\n  console.log('⚠️ Risky token detected!');\n}"
      },
      {
        "title": "Before Signing Transactions",
        "body": "const simulation = await fetch402('https://hackathon.aegis402.xyz/v1/simulate-tx', {\n  method: 'POST',\n  headers: { 'Content-Type': 'application/json' },\n  body: JSON.stringify({ from, to, value, data, chain_id: 8453 })\n});\n\nconst { isSafe, riskLevel, warnings } = await simulation.json();\n\nif (!isSafe || riskLevel === 'CRITICAL') {\n  console.log('🚨 Dangerous transaction!', warnings);\n}"
      },
      {
        "title": "Risk Levels",
        "body": "LevelMeaningSAFENo issues detectedLOWMinor concerns, generally safeMEDIUMSome risks, proceed with cautionHIGHSignificant risks detectedCRITICALDo not proceed"
      },
      {
        "title": "Supported Chains (for scanning)",
        "body": "ChainIDcheck-tokencheck-addresssimulate-txEthereum1✅✅✅Base8453✅✅✅Polygon137✅✅✅Arbitrum42161✅✅✅Optimism10✅✅✅BSC56✅✅✅"
      },
      {
        "title": "Health Check (Free)",
        "body": "curl https://hackathon.aegis402.xyz/health"
      },
      {
        "title": "Links",
        "body": "Hackathon API: https://hackathon.aegis402.xyz\nProduction API: https://aegis402.xyz\nGitHub: https://github.com/SwiftAdviser/aegis-402-shield-protocol\nx402 Protocol: https://docs.x402.org\n\n🛡️ Built for the Agentic Economy. Powered by x402 Protocol."
      }
    ],
    "body": "Aegis402 Shield Protocol (Hackathon/Testnet)\n\nBlockchain security API for AI agents. Testnet version - pay with Base Sepolia USDC.\n\n⚠️ This is the hackathon/testnet deployment. For production, use aegis-security.\n\nSkill Files\nFile\tURL\nSKILL.md (this file)\thttps://hackathon.aegis402.xyz/skill.md\npackage.json (metadata)\thttps://hackathon.aegis402.xyz/skill.json\n\nBase URL: https://hackathon.aegis402.xyz/v1\n\nQuick Start\nnpm install @x402/fetch @x402/evm\n\nimport { x402Client, wrapFetchWithPayment } from '@x402/fetch';\nimport { ExactEvmScheme } from '@x402/evm/exact/client';\n\nconst client = new x402Client()\n  .register('eip155:*', new ExactEvmScheme(yourEvmWallet));\n\nconst fetch402 = wrapFetchWithPayment(fetch, client);\n\n// Payments on Base Sepolia (testnet USDC)\nconst res = await fetch402('https://hackathon.aegis402.xyz/v1/check-token/0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48?chain_id=1');\nconst data = await res.json();\n\n\nRequirements: Testnet USDC on Base Sepolia (chain ID 84532)\n\nGet testnet USDC: Base Sepolia Faucet\n\nPricing (Testnet USDC)\nEndpoint\tPrice\tUse Case\nPOST /simulate-tx\t$0.05\tTransaction simulation, DeFi safety\nGET /check-token/:address\t$0.01\tToken honeypot detection\nGET /check-address/:address\t$0.005\tAddress reputation check\nEndpoints\nCheck Token ($0.01)\n\nScan any token for honeypots, scams, and risks.\n\ncurl \"https://hackathon.aegis402.xyz/v1/check-token/0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48?chain_id=1\"\n\n\nResponse:\n\n{\n  \"address\": \"0xA0b86991c6218b36c1d19D4a2e9Eb0cE3606eB48\",\n  \"isHoneypot\": false,\n  \"trustScore\": 95,\n  \"risks\": [],\n  \"_meta\": { \"requestId\": \"uuid\", \"duration\": 320 }\n}\n\nCheck Address ($0.005)\n\nVerify if address is flagged for phishing or poisoning.\n\ncurl \"https://hackathon.aegis402.xyz/v1/check-address/0x742d35Cc6634C0532925a3b844Bc454e4438f44e\"\n\n\nResponse:\n\n{\n  \"address\": \"0x742d35Cc6634C0532925a3b844Bc454e4438f44e\",\n  \"isPoisoned\": false,\n  \"reputation\": \"NEUTRAL\",\n  \"tags\": [\"wallet\", \"established\"],\n  \"_meta\": { \"requestId\": \"uuid\", \"duration\": 180 }\n}\n\nSimulate Transaction ($0.05)\n\nPredict balance changes and detect threats before signing.\n\ncurl -X POST \"https://hackathon.aegis402.xyz/v1/simulate-tx\" \\\n  -H \"Content-Type: application/json\" \\\n  -d '{\n    \"from\": \"0xYourWallet...\",\n    \"to\": \"0xContract...\",\n    \"value\": \"1000000000000000000\",\n    \"data\": \"0x...\",\n    \"chain_id\": 8453\n  }'\n\n\nResponse:\n\n{\n  \"isSafe\": true,\n  \"riskLevel\": \"LOW\",\n  \"simulation\": {\n    \"balanceChanges\": [\n      { \"asset\": \"USDC\", \"amount\": \"-100.00\", \"address\": \"0x...\" }\n    ]\n  },\n  \"warnings\": [],\n  \"_meta\": { \"requestId\": \"uuid\", \"duration\": 450 }\n}\n\nx402 Payment Flow (Testnet)\nAgent calls any paid endpoint\nReceives 402 Payment Required with Base Sepolia payment instructions\nPays testnet USDC on Base Sepolia (chain ID: 84532)\nRetries request with payment proof header\nGets security scan result\n\nNetwork: Base Sepolia (eip155:84532) Currency: Testnet USDC\n\nUse Cases for AI Agents\nBefore Swapping Tokens\nconst tokenCheck = await fetch402(`https://hackathon.aegis402.xyz/v1/check-token/${tokenAddress}?chain_id=8453`);\nconst { isHoneypot, trustScore } = await tokenCheck.json();\n\nif (isHoneypot || trustScore < 50) {\n  console.log('⚠️ Risky token detected!');\n}\n\nBefore Signing Transactions\nconst simulation = await fetch402('https://hackathon.aegis402.xyz/v1/simulate-tx', {\n  method: 'POST',\n  headers: { 'Content-Type': 'application/json' },\n  body: JSON.stringify({ from, to, value, data, chain_id: 8453 })\n});\n\nconst { isSafe, riskLevel, warnings } = await simulation.json();\n\nif (!isSafe || riskLevel === 'CRITICAL') {\n  console.log('🚨 Dangerous transaction!', warnings);\n}\n\nRisk Levels\nLevel\tMeaning\nSAFE\tNo issues detected\nLOW\tMinor concerns, generally safe\nMEDIUM\tSome risks, proceed with caution\nHIGH\tSignificant risks detected\nCRITICAL\tDo not proceed\nSupported Chains (for scanning)\nChain\tID\tcheck-token\tcheck-address\tsimulate-tx\nEthereum\t1\t✅\t✅\t✅\nBase\t8453\t✅\t✅\t✅\nPolygon\t137\t✅\t✅\t✅\nArbitrum\t42161\t✅\t✅\t✅\nOptimism\t10\t✅\t✅\t✅\nBSC\t56\t✅\t✅\t✅\nHealth Check (Free)\ncurl https://hackathon.aegis402.xyz/health\n\nLinks\nHackathon API: https://hackathon.aegis402.xyz\nProduction API: https://aegis402.xyz\nGitHub: https://github.com/SwiftAdviser/aegis-402-shield-protocol\nx402 Protocol: https://docs.x402.org\n\n🛡️ Built for the Agentic Economy. Powered by x402 Protocol."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/SwiftAdviser/aegis-security-hackathon",
    "publisherUrl": "https://clawhub.ai/SwiftAdviser/aegis-security-hackathon",
    "owner": "SwiftAdviser",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/aegis-security-hackathon",
    "downloadUrl": "https://openagent3.xyz/downloads/aegis-security-hackathon",
    "agentUrl": "https://openagent3.xyz/skills/aegis-security-hackathon/agent",
    "manifestUrl": "https://openagent3.xyz/skills/aegis-security-hackathon/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/aegis-security-hackathon/agent.md"
  }
}