{
  "schemaVersion": "1.0",
  "item": {
    "slug": "hookaido",
    "name": "Hookaido Operator",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/7schmiede/hookaido",
    "canonicalUrl": "https://clawhub.ai/7schmiede/hookaido",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/hookaido",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=hookaido",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "agents/openai.yaml",
      "references/operations.md",
      "scripts/install_hookaido.sh",
      "README.md",
      "RELEASE_NOTES.md",
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/hookaido"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/hookaido",
    "agentPageUrl": "https://openagent3.xyz/skills/hookaido/agent",
    "manifestUrl": "https://openagent3.xyz/skills/hookaido/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/hookaido/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Overview",
        "body": "Implement and troubleshoot Hookaido with a config-first workflow: edit Hookaidofile, validate, run, exercise ingress/pull flows, then diagnose queue health and DLQ behavior.\nTreat Hookaido v2.0.0's modular architecture as additive in this skill: keep the existing workflow intact by default, and opt into modules such as postgres, gRPC workers, or release verification only when they materially help the task.\nUse conservative, reversible changes and validate before runtime operations."
      },
      {
        "title": "Workflow",
        "body": "Confirm target topology: inbound+pull (HTTP or gRPC), push outbound, or internal queue, plus the queue backend (sqlite, memory, or postgres).\nChoose runtime mode and ensure hookaido exists where tools execute.\n\nHost-binary mode: use the install action from metadata.openclaw.install.\nHost fallback: run bash {baseDir}/scripts/install_hookaido.sh (pinned v2.0.0, SHA256-verified).\nPublic repo/source mode: use the public upstream repo github.com/nuetzliches/hookaido via go install github.com/nuetzliches/hookaido/cmd/hookaido@v2.0.0 when a source-based install is preferred.\nDocker-sandbox mode: use a sandbox image that already includes hookaido (preferred), or install inside sandbox via agents.defaults.sandbox.docker.setupCommand.\nKeep host install actions available as fallback and to satisfy metadata.openclaw.requires.bins.\n\n\nInspect and update Hookaidofile minimally.\nRun format and validation before starting or reloading:\n\nhookaido config fmt --config ./Hookaidofile\nhookaido config validate --config ./Hookaidofile\nhookaido config validate --config ./Hookaidofile --strict-secrets when secret refs or Vault-backed config are involved.\n\n\nStart runtime and verify health:\n\nhookaido run --config ./Hookaidofile --db ./.data/hookaido.db\nhookaido run --config ./Hookaidofile --postgres-dsn \"$HOOKAIDO_POSTGRES_DSN\" when queue postgres is selected.\ncurl http://127.0.0.1:2019/healthz?details=1\n\n\nValidate end-to-end behavior:\n\ningress request accepted and queued\nconsumer dequeue/ack/nack/extend path works (HTTP pull, batch ack/nack, plus gRPC pull when enabled)\n\n\nFor incidents, inspect backlog and DLQ first, then mutate."
      },
      {
        "title": "Configure Ingress and Pull Consumption",
        "body": "Define a route with explicit auth and pull path (HTTP pull, optional gRPC pull worker listener).\nKeep secrets in env/file refs, never inline.\nVerify route and global pull auth are consistent.\nTest with a real webhook payload and a dequeue/ack cycle, using batch ack/nack when worker throughput matters.\n\nPrefer this baseline:\n\ningress {\n  listen :8080\n}\n\npull_api {\n  listen :9443\n  grpc_listen :9943 # optional gRPC pull-worker listener\n  auth token env:HOOKAIDO_PULL_TOKEN\n}\n\n/webhooks/github {\n  auth hmac env:HOOKAIDO_INGRESS_SECRET\n  pull { path /pull/github }\n}"
      },
      {
        "title": "Configure Push Delivery",
        "body": "Use push delivery only when inbound connectivity to the service is acceptable.\nSet timeout and retry policy explicitly.\nValidate downstream idempotency since delivery is at-least-once.\n\n/webhooks/stripe {\n  auth hmac env:STRIPE_SIGNING_SECRET\n  deliver \"https://billing.internal/stripe\" {\n    retry exponential max 8 base 2s cap 2m jitter 0.2\n    timeout 10s\n  }\n}"
      },
      {
        "title": "Configure Queue Backends",
        "body": "Default to sqlite unless the task explicitly needs ephemeral dev mode or shared Postgres storage.\nTreat memory and postgres as additive v2 modules, not replacements for existing sqlite workflows.\nWhen using postgres, document the DSN source and validate health plus backlog endpoints after startup.\n\nPrefer these patterns:\n\nqueue sqlite\n\nqueue memory\n\nqueue postgres"
      },
      {
        "title": "Operate Queue and DLQ",
        "body": "Start with health details and backlog endpoints.\nInspect DLQ before requeue or delete.\nIf requeueing many items, explain expected impact and rollback path.\nRequire clear operator reason strings for mutating admin calls.\n\nUse:\n\nGET /healthz?details=1\nGET /backlog/trends\nGET /dlq\nPOST /dlq/requeue\nPOST /dlq/delete"
      },
      {
        "title": "Use MCP Mode for AI Operations",
        "body": "Default to --role read for diagnostics.\nEnable mutations only with explicit operator intent:\n\n--enable-mutations --role operate --principal <identity>\n\n\nEnable runtime control only for admin workflows:\n\n--enable-runtime-control --role admin --pid-file <path>\n\n\nInclude reason for mutation calls and keep it specific."
      },
      {
        "title": "Verify Public Releases",
        "body": "Prefer official release assets from the public Hookaido repo.\nWhen supply-chain assurance matters, validate checksums, signature material, and provenance before rollout.\nKeep verification optional by default so existing skill flows do not become heavier unless the task requires it.\n\nUse:\n\nhookaido verify-release --checksums ./hookaido_v2.0.0_checksums.txt --require-provenance"
      },
      {
        "title": "Validation Checklist",
        "body": "hookaido config validate returns success before runtime start/reload.\nhookaido config validate --strict-secrets is used when secret refs, Vault, or public-release rollout validation matters.\nHealth endpoint is reachable and reports expected queue/backend state.\nPull consumer can dequeue, ack, nack, and extend with valid token (HTTP and optional gRPC transport), including batch ack/nack when enabled.\nFor push mode, retry/timeout behavior is explicitly configured.\nFor queue postgres, runtime is started with --postgres-dsn or HOOKAIDO_POSTGRES_DSN.\nAny DLQ mutation is scoped, justified, and logged."
      },
      {
        "title": "Safety Rules",
        "body": "Do not disable auth to \"make tests pass.\"\nDo not suggest direct mutations before read-only diagnostics.\nTreat queue operations as at-least-once; require idempotent handlers.\nKeep secrets in env: or file: refs."
      },
      {
        "title": "References",
        "body": "Read references/operations.md for command snippets and API payload templates."
      }
    ],
    "body": "Hookaido\nOverview\n\nImplement and troubleshoot Hookaido with a config-first workflow: edit Hookaidofile, validate, run, exercise ingress/pull flows, then diagnose queue health and DLQ behavior. Treat Hookaido v2.0.0's modular architecture as additive in this skill: keep the existing workflow intact by default, and opt into modules such as postgres, gRPC workers, or release verification only when they materially help the task. Use conservative, reversible changes and validate before runtime operations.\n\nWorkflow\nConfirm target topology: inbound+pull (HTTP or gRPC), push outbound, or internal queue, plus the queue backend (sqlite, memory, or postgres).\nChoose runtime mode and ensure hookaido exists where tools execute.\nHost-binary mode: use the install action from metadata.openclaw.install.\nHost fallback: run bash {baseDir}/scripts/install_hookaido.sh (pinned v2.0.0, SHA256-verified).\nPublic repo/source mode: use the public upstream repo github.com/nuetzliches/hookaido via go install github.com/nuetzliches/hookaido/cmd/hookaido@v2.0.0 when a source-based install is preferred.\nDocker-sandbox mode: use a sandbox image that already includes hookaido (preferred), or install inside sandbox via agents.defaults.sandbox.docker.setupCommand.\nKeep host install actions available as fallback and to satisfy metadata.openclaw.requires.bins.\nInspect and update Hookaidofile minimally.\nRun format and validation before starting or reloading:\nhookaido config fmt --config ./Hookaidofile\nhookaido config validate --config ./Hookaidofile\nhookaido config validate --config ./Hookaidofile --strict-secrets when secret refs or Vault-backed config are involved.\nStart runtime and verify health:\nhookaido run --config ./Hookaidofile --db ./.data/hookaido.db\nhookaido run --config ./Hookaidofile --postgres-dsn \"$HOOKAIDO_POSTGRES_DSN\" when queue postgres is selected.\ncurl http://127.0.0.1:2019/healthz?details=1\nValidate end-to-end behavior:\ningress request accepted and queued\nconsumer dequeue/ack/nack/extend path works (HTTP pull, batch ack/nack, plus gRPC pull when enabled)\nFor incidents, inspect backlog and DLQ first, then mutate.\nTask Playbooks\nConfigure Ingress and Pull Consumption\nDefine a route with explicit auth and pull path (HTTP pull, optional gRPC pull worker listener).\nKeep secrets in env/file refs, never inline.\nVerify route and global pull auth are consistent.\nTest with a real webhook payload and a dequeue/ack cycle, using batch ack/nack when worker throughput matters.\n\nPrefer this baseline:\n\ningress {\n  listen :8080\n}\n\npull_api {\n  listen :9443\n  grpc_listen :9943 # optional gRPC pull-worker listener\n  auth token env:HOOKAIDO_PULL_TOKEN\n}\n\n/webhooks/github {\n  auth hmac env:HOOKAIDO_INGRESS_SECRET\n  pull { path /pull/github }\n}\n\nConfigure Push Delivery\nUse push delivery only when inbound connectivity to the service is acceptable.\nSet timeout and retry policy explicitly.\nValidate downstream idempotency since delivery is at-least-once.\n/webhooks/stripe {\n  auth hmac env:STRIPE_SIGNING_SECRET\n  deliver \"https://billing.internal/stripe\" {\n    retry exponential max 8 base 2s cap 2m jitter 0.2\n    timeout 10s\n  }\n}\n\nConfigure Queue Backends\nDefault to sqlite unless the task explicitly needs ephemeral dev mode or shared Postgres storage.\nTreat memory and postgres as additive v2 modules, not replacements for existing sqlite workflows.\nWhen using postgres, document the DSN source and validate health plus backlog endpoints after startup.\n\nPrefer these patterns:\n\nqueue sqlite\n\nqueue memory\n\nqueue postgres\n\nOperate Queue and DLQ\nStart with health details and backlog endpoints.\nInspect DLQ before requeue or delete.\nIf requeueing many items, explain expected impact and rollback path.\nRequire clear operator reason strings for mutating admin calls.\n\nUse:\n\nGET /healthz?details=1\nGET /backlog/trends\nGET /dlq\nPOST /dlq/requeue\nPOST /dlq/delete\nUse MCP Mode for AI Operations\nDefault to --role read for diagnostics.\nEnable mutations only with explicit operator intent:\n--enable-mutations --role operate --principal <identity>\nEnable runtime control only for admin workflows:\n--enable-runtime-control --role admin --pid-file <path>\nInclude reason for mutation calls and keep it specific.\nVerify Public Releases\nPrefer official release assets from the public Hookaido repo.\nWhen supply-chain assurance matters, validate checksums, signature material, and provenance before rollout.\nKeep verification optional by default so existing skill flows do not become heavier unless the task requires it.\n\nUse:\n\nhookaido verify-release --checksums ./hookaido_v2.0.0_checksums.txt --require-provenance\nValidation Checklist\nhookaido config validate returns success before runtime start/reload.\nhookaido config validate --strict-secrets is used when secret refs, Vault, or public-release rollout validation matters.\nHealth endpoint is reachable and reports expected queue/backend state.\nPull consumer can dequeue, ack, nack, and extend with valid token (HTTP and optional gRPC transport), including batch ack/nack when enabled.\nFor push mode, retry/timeout behavior is explicitly configured.\nFor queue postgres, runtime is started with --postgres-dsn or HOOKAIDO_POSTGRES_DSN.\nAny DLQ mutation is scoped, justified, and logged.\nSafety Rules\nDo not disable auth to \"make tests pass.\"\nDo not suggest direct mutations before read-only diagnostics.\nTreat queue operations as at-least-once; require idempotent handlers.\nKeep secrets in env: or file: refs.\nReferences\nRead references/operations.md for command snippets and API payload templates."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/7schmiede/hookaido",
    "publisherUrl": "https://clawhub.ai/7schmiede/hookaido",
    "owner": "7schmiede",
    "version": "2.0.1",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/hookaido",
    "downloadUrl": "https://openagent3.xyz/downloads/hookaido",
    "agentUrl": "https://openagent3.xyz/skills/hookaido/agent",
    "manifestUrl": "https://openagent3.xyz/skills/hookaido/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/hookaido/agent.md"
  }
}