Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
On-chain immutable data storage using IQ Labs tech stack (IQDB, hanLock, x402). Use when building Solana-based persistent storage, on-chain databases, tamper-evident records, password-encoded data, or paid file inscription. Triggers on tasks involving on-chain CRUD, Solana PDA storage, rolling hash verification, Hangul encoding, or HTTP 402 payment-gated inscription.
On-chain immutable data storage using IQ Labs tech stack (IQDB, hanLock, x402). Use when building Solana-based persistent storage, on-chain databases, tamper-evident records, password-encoded data, or paid file inscription. Triggers on tasks involving on-chain CRUD, Solana PDA storage, rolling hash verification, Hangul encoding, or HTTP 402 payment-gated inscription.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Build on-chain relational databases on Solana using IQ Labs' tech stack. Three tools: IQDB โ Full CRUD relational database on Solana via Anchor PDAs. Tables, rows, rolling keccak hash for tamper-evident history. hanLock โ Password-based Hangul syllabic encoding (base-11172). Lightweight data encoding for on-chain privacy. Zero dependencies. x402 โ HTTP 402 payment-gated file inscription to Solana. Quote โ Pay (USDC/SOL) โ Broadcast chunk transactions โ Download.
Node.js 18+ Solana CLI (solana --version) A Solana wallet with devnet SOL (solana airdrop 2)
Mainnet: Fully supported. Program ID: 9KLLchQVJpGkw4jPuUmnvqESdR7mtNCYr3qS4iQLabs (via @iqlabs-official/solana-sdk). Devnet: Supported via legacy SDK (@iqlabsteam/iqdb). Program: 7Vk5JJDxUBAaaAkpYQpWYCZNz4SVPm3mJFSxrBzTQuAX.
npm install @iqlabs-official/solana-sdk @solana/web3.js
npm install @iqlabsteam/iqdb @coral-xyz/anchor @solana/web3.js
ANCHOR_WALLET=/path/to/keypair.json # Required โ Solana keypair for signing ANCHOR_PROVIDER_URL=https://api.devnet.solana.com # Required โ RPC for writes NETWORK_URL=https://api.devnet.solana.com # Required โ RPC for reads (must match ANCHOR_PROVIDER_URL) Legacy SDK note: Set NETWORK_URL to match ANCHOR_PROVIDER_URL. The SDK uses separate connections for reads and writes. RPC Note: Public Solana RPCs rate-limit aggressively. Add 2-3 second delays between rapid transactions on mainnet. Use a dedicated RPC provider (Helius, Alchemy, QuickNode) for production.
const { Connection, Keypair, SystemProgram, PublicKey } = require('@solana/web3.js'); const { writer, reader, setRpcUrl, contract } = require('@iqlabs-official/solana-sdk'); // Monkey-patch for Node v24 Buffer compatibility const seedModule = require('@iqlabs-official/solana-sdk/dist/sdk/utils/seed'); const origFn = seedModule.toSeedBytes; seedModule.toSeedBytes = (v) => Buffer.from(origFn(v)); setRpcUrl('https://api.mainnet-beta.solana.com'); const connection = new Connection('https://api.mainnet-beta.solana.com', 'confirmed'); // Write a row (requires root + table initialized first โ see references/iqdb-core.md) const sig = await writer.writeRow( connection, signer, 'my-db-root', 'players', JSON.stringify({ name: 'Alice', score: '1500', level: '12' }) ); // Read rows const rows = await reader.readTableRows(tablePda);
// Use CommonJS โ the SDK bundles CJS internally const { createIQDB } = require('@iqlabsteam/iqdb'); const iqdb = createIQDB(); // Ensure root PDA exists (idempotent) await iqdb.ensureRoot(); // Create a table (idempotent โ use ensureTable over createTable) await iqdb.ensureTable('players', ['name', 'score', 'level'], 'name'); // Write a row โ data must be a JSON STRING, not an object await iqdb.writeRow('players', JSON.stringify({ name: 'Alice', score: '1500', level: '12' })); // Read all rows โ requires userPubkey as string const rows = await iqdb.readRowsByTable({ userPubkey: 'YOUR_WALLET_PUBKEY', tableName: 'players' }); console.log(rows);
Root PDA (per wallet) โโโ Table PDA (per table name) โโโ Rows stored as transaction data โโโ hash: keccak(domain || prev_hash || tx_data) Root PDA โ One per wallet. Initialized via ensureRoot(). Table PDA โ Created via ensureTable() or createTable(). Has column schema and ID column. Rows โ Written as JSON strings via writeRow(). Append-only โ each write is a new transaction. Rolling hash โ Each write appends to an immutable hash chain. Enables tamper detection without full replication.
See references/iqdb-core.md for full API. OperationMethodCostInit rootcontract.initializeDbRootInstruction() / ensureRoot()~0.01 SOL rentCreate tablecontract.createTableInstruction() / ensureTable()~0.02 SOL rentWrite rowwriter.writeRow() / iqdb.writeRow()~0.005-0.01 SOLRead rowsreader.readTableRows() / readRowsByTable()Free (RPC read)Update/DeletepushInstruction(table, txSig, before, after)TX fee onlyExtension tablecreateExtTable(base, rowId, extKey, cols, idCol?)~0.02 SOL rent Cost reference (mainnet): Root + 3 tables + 5 data rows = ~0.09 SOL total.
Row data size limit: Keep row JSON under ~100 bytes. The on-chain program enforces a transaction size limit (TxTooLong error). For larger data, split across multiple rows or use hanLock sparingly (encoded output is larger than input). Append-only writes: writeRow always appends. Use pushInstruction for updates/deletes. pushInstruction writes to instruction log, not row data. readRowsByTable returns raw rows and does NOT reflect updates/deletes from pushInstruction. To see the full picture including corrections, use searchTableByName which returns both rows (raw) and instruRows/targetContent (instruction history). Your application must apply instruction corrections on top of raw rows. CommonJS required: The SDK uses dynamic require() internally. Use .cjs files or "type": "commonjs" in package.json. ESM imports will fail.
See references/hanlock.md for full API. Encode data with a password before writing on-chain for lightweight privacy: const { encodeWithPassword, decodeWithPassword } = require('hanlock'); const encoded = encodeWithPassword('short secret', 'mypassword'); // โ Korean syllable string like "๊น๋ฃ๋ญก..." // Write encoded data on-chain await iqdb.writeRow('secrets', JSON.stringify({ owner: 'Alice', data: encoded })); // Later โ decode const decoded = decodeWithPassword(encoded, 'mypassword'); // โ 'short secret' Note: hanLock encoding expands data size (~3x). Keep input short to stay within the on-chain row size limit.
See references/x402-payments.md for full API. Payment-gated file inscription to Solana: Quote โ POST /quote with file metadata โ get price in USDC/SOL Pay โ Send payment transaction to provided address Inscribe โ POST /inscribe with payment proof โ file chunked into Solana transactions Download โ GET /download/:txId โ reconstruct file from on-chain chunks
Discord RPG Bot โ On-chain character persistence, provable item ownership, immutable game state Governance โ Tamper-evident proposal/vote storage with rolling hash audit trail Compliance logs โ Verifiable edit history for call center records Paid storage โ Monetize data inscription via x402
IQ Labs SDK โ Official Solana SDK (mainnet) @iqlabsteam/iqdb โ Legacy SDK (devnet) hanLock โ Hangul syllabic encoding Solana Web3.js โ Solana client library
Data access, storage, extraction, analysis, reporting, and insight generation.
Largest current source with strong distribution and engagement signals.