Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Create secure shareable self-destructing notes
Create secure shareable self-destructing notes
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Secure self-destructing shareable notes for OpenClaw Create encrypted, one-time-read notes directly from OpenClaw. The server never sees your plaintext.
PropertyValueNamefadnoteVersion1.0.2AuthoreasyFloydLicenseMITOpen SourceYes โ https://github.com/easyFloyd/fadnoteRuntimeNode.js 18+
# Via ClawHub claw install fadnote # Manual git clone https://github.com/easyFloyd/fadnote.git ln -s $(pwd)/fadnote/openclaw-skill/scripts/fadnote.js ~/.claw/bin/fadnote
VariableDefaultDescriptionFADNOTE_URLhttps://fadnote.comFadNote server endpoint
user: Secure this API key: sk-abc123xyz claw: I'll create a secure, self-destructing note for that. [runs: echo "sk-abc123xyz" | fadnote] ๐ https://fadnote.com/n/abc123# decryption-key-here Share it with the recipient via any channel and this link will self-destruct after first view.
Usage: fadnote [options] [text] echo "text" | fadnote [options] Create secure self-destructing notes that can only be viewed once. Options: -h, --help Show this help message and exit --ttl <secs> Time until note expires (default: 86400 = 24h) --json Output JSON with noteId, expiresIn, and decryptionUrl Environment: FADNOTE_URL API endpoint (default: https://fadnote.com) Examples: # Standard fadnote "My secret message" # direct input echo "My secret" | fadnote # from stdin # With options fadnote --ttl 3600 "Expires in 1 hour" # Custom TTL fadnote --json --ttl 7200 "JSON output" # JSON output: # {noteId: string, expiresIn: number, decryptionUrl: string} # File and clipboard input cat file.txt | fadnote --ttl 86400 # from stdin with options pbpaste | fadnote # macOS clipboard xclip -o -selection clipboard | fadnote # from clipboard (Linux with xclip) xsel -b | fadnote # from clipboard (Linux with xsel) Single Output: Single line with the shareable URL. JSON Output: { noteId: string, expiresIn: number, decryptionUrl: string }
Client-side encryption โ AES-256-GCM with PBKDF2 (600k iterations) Zero knowledge โ Server receives only encrypted blobs One-time read โ Note deleted immediately after first fetch Auto-expire โ Default 24 hour TTL Open Source โ Server code is publicly auditable at https://github.com/easyFloyd/fadnote The decryption key is embedded in the URL fragment (#key) and never sent to the server.
openclaw-skill/ โโโ SKILL.md # This file โโโ scripts/ โโโ fadnote.js # Main CLI script (~160 lines)
Node.js 18+ (no external dependencies)
ErrorCauseSolutionFADNOTE_URL not setEnvironment variable missingexport FADNOTE_URL=https://fadnote.comEmpty noteNo input providedPipe text into fadnote: echo "secret" | fadnote404 Not FoundServer endpoint wrongCheck FADNOTE_URL points to a running FadNote instanceConnection refusedServer unreachableVerify server is up or use the live serviceCrypto not availableNode.js < 18Upgrade to Node.js 18+
Live Service: https://fadnote.com Source: https://github.com/easyFloyd/fadnote Issues: https://github.com/easyFloyd/fadnote/issues
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.