โ† All skills
Tencent SkillHub ยท Developer Tools

Skill

Nostr identity setup and health-check CLI. Creates a complete Nostr identity (keypair, profile, relay list, lightning address, Cashu wallet) in one command....

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Nostr identity setup and health-check CLI. Creates a complete Nostr identity (keypair, profile, relay list, lightning address, Cashu wallet) in one command....

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
0.12.3

Documentation

ClawHub primary doc Primary doc: SKILL.md 22 sections Open source page

nihao ๐Ÿ‘‹

Nostr identity setup and health-check CLI. Single binary, non-interactive, agent-friendly. Source: https://github.com/dergigi/nihao

Capabilities Disclosure

This skill installs a single Go binary (nihao) that: Generates Nostr keypairs โ€” random Ed25519 key generation via crypto/rand Publishes events โ€” kind 0 (profile), kind 3 (follows), kind 1 (note), kind 10002 (relay list), kind 10050 (DM relays), kind 17375 (wallet), kind 10019 (nutzap info) Makes HTTP requests โ€” NIP-05 verification, LNURL resolution, Cashu mint validation, relay NIP-11 probes, image HEAD checks Connects to Nostr relays โ€” WebSocket connections to publish and query events It does not: Store keys on disk (prints nsec to stdout; use --nsec-file to write to a file or --nsec-cmd to pipe to a command) Run as a daemon or background process Access local files beyond the binary itself Require any accounts, API keys, or KYC

Prerequisites

Go 1.21+ โ€” required to compile the binary from source. Check with go version. Install: https://go.dev/dl/ or via your package manager (brew install go, apt install golang, etc.)

Install

nihao is distributed as source code compiled locally via Go's standard toolchain. No pre-built binaries are downloaded โ€” the code is fetched from GitHub, compiled on your machine, and placed in your $GOPATH/bin. go install github.com/dergigi/nihao@latest Verify: nihao version The source is fully auditable at https://github.com/dergigi/nihao.

On Install

When an agent installs this skill:

Step 1: Install Binary

go install github.com/dergigi/nihao@latest

Step 2: Create Identity

nihao --name "<AGENT_NAME>" --about "<AGENT_BIO>" --nsec-file ./nsec.key --json --quiet This generates a keypair, publishes the identity, and securely writes the nsec to ./nsec.key with 0600 permissions. Parse the JSON output to extract npub, pubkey, and relays. โš ๏ธ The nsec cannot be recovered if lost. Always use --nsec-file or --nsec-cmd to persist it securely.

Step 3: Report to User

Tell the user: Their agent's npub Their agent's lightning address (default: <npub>@npub.cash) Remind them to back up the nsec

Step 4: (Optional) Follow Owner

If the user provides their npub, the agent should follow them. nihao doesn't handle follows of specific npubs โ€” use nak or another tool for that.

Setup โ€” Create a New Identity

nihao --name "AgentName" --about "I do things" --json What this does: Generates a Nostr keypair (or uses --sec/--stdin) Publishes profile metadata (kind 0) Publishes relay list (kind 10002) with NIP-65 read/write markers Publishes DM relay list (kind 10050) per NIP-17 Publishes follow list (kind 3) Sets up a NIP-60 Cashu wallet (kind 17375 + kind 10019) Sets lightning address to <npub>@npub.cash Posts a first note with #nihao hashtag

Setup Flags

FlagPurpose--name <name>Display name (default: "nihao-user")--about <text>Bio--picture <url>Profile picture URL--banner <url>Banner image URL--nip05 <user@domain>NIP-05 identifier--lud16 <user@domain>Lightning address (default: npub@npub.cash)--relays <r1,r2,...>Override default relay list--discoverDiscover relays from well-connected npubs--dm-relays <r1,r2,...>Override DM relay list (kind 10050)--no-dm-relaysSkip DM relay list publishing--mint <url>Custom Cashu mint (repeatable)--no-walletSkip wallet setup--sec, --nsec <nsec|hex>Use existing secret key--stdinRead secret key from stdin--nsec-file <path>Write nsec to file (0600 perms) for secure storage--nsec-cmd <command>Pipe nsec to shell command (alias: --nsec-exec)--jsonJSON output for parsing--quiet, -qSuppress non-JSON, non-error output

Key Management

nihao never writes keys to disk by default. Secret keys are handled securely: --nsec-file <path> โ€” writes nsec to a file with 0600 permissions (recommended for automation) --nsec-cmd <command> โ€” pipes nsec to a command's stdin (e.g., a password manager), never as a CLI argument --stdin โ€” reads an existing key from stdin, avoiding shell history and process list exposure --json output โ€” includes nsec in structured output for programmatic parsing โš ๏ธ Avoid passing raw nsec values as CLI arguments (e.g., --sec nsec1...) in shared environments, as arguments are visible in process listings. Prefer --stdin or --nsec-cmd instead. # Generate and save securely nihao --name "Bot" --nsec-file ./bot-nsec.key --json # Pipe to password manager nihao --name "Bot" --nsec-cmd "pass insert -m nostr/nsec" --json # Use existing key via stdin (avoids process list exposure) echo "$NSEC" | nihao --name "Bot" --stdin

Check โ€” Audit an Existing Identity

nihao check npub1... --json Checks and scores (0โ€“8): CheckWhat it doesprofileKind 0 completeness (name, display_name, about, picture, banner)nip05NIP-05 live HTTP verification, root domain detectionpictureImage reachability, Blossom hosting detection, file sizebannerSame as picturelud16Lightning address LNURL resolutionrelay_listKind 10002 presence, relay countrelay_markersNIP-65 read/write marker analysisrelay_qualityPer-relay latency, NIP-11 support, reachabilitydm_relaysKind 10050 DM relay list (NIP-17)follow_listKind 3 follow countnip60_walletKind 17375/37375 wallet presencenutzap_infoKind 10019 nutzap configurationwallet_mintsCashu mint reachability and validation

Check Flags

FlagPurpose--jsonStructured JSON output--quiet, -qSuppress non-JSON output--relays <r1,r2,...>Query these relays instead of defaults

Exit Codes

CodeMeaning0All checks pass (score = max)1One or more checks fail

Backup โ€” Export Identity Events

nihao backup <npub|nip05> > identity.json nihao backup <npub|nip05> --quiet > identity.json Exports all identity-related events as JSON: kind 0 (profile), kind 3 (follows), kind 10002 (relay list), kind 10050 (DM relays), kind 10019 (nutzap info), kind 17375/37375 (wallet). JSON goes to stdout, progress to stderr. Use for snapshots, migration, or archival.

Backup Flags

FlagPurpose--quiet, -qSuppress progress output (JSON always goes to stdout)--relays <r1,r2,...>Query these relays instead of defaults

JSON Output

Both setup and check support --json for structured, parseable output. Setup output: { "npub": "npub1...", "nsec": "nsec1...", "pubkey": "hex...", "relays": ["wss://..."], "profile": { "name": "...", "lud16": "..." }, "wallet": { "p2pk_pubkey": "02...", "mints": ["https://..."] } } Check output: { "npub": "npub1...", "pubkey": "hex...", "score": 6, "max_score": 8, "checks": [ { "name": "profile", "status": "pass", "detail": "..." }, { "name": "nip05", "status": "fail", "detail": "not set" } ] }

TOOLS.md

  • After setup, store for quick reference:
  • ## Nostr Identity
  • npub: npub1...
  • Lightning: npub1...@npub.cash
  • Relays: relay.damus.io, relay.primal.net, nos.lol

Periodic Health Check

Run nihao check <npub> --json --quiet on a schedule to monitor identity health. Parse the JSON and alert if score drops.

Security

No pre-built binaries โ€” nihao is compiled from source on your machine via go install. The source is public and auditable. No key storage โ€” nihao does not persist keys unless explicitly told to via --nsec-file or --nsec-cmd. No network exfiltration โ€” the only network connections are to Nostr relays (WebSocket), NIP-05/LNURL endpoints (HTTPS), and Cashu mints (HTTPS). No telemetry, no analytics, no phoning home. Stdin-first key input โ€” when using an existing key, prefer --stdin over --sec to avoid process list exposure. File permissions โ€” --nsec-file writes with 0600 (owner read/write only).

Defaults

SettingValueRelaysrelay.damus.io, relay.primal.net, nos.lol, purplepag.esDM relaysnip17.com, relay.damus.io, relay.primal.net, nos.lolLightning<npub>@npub.cashMintsminibits, coinos, macadamiaWallet kind17375 (NIP-60)

Category context

Code helpers, APIs, CLIs, browser automation, testing, and developer operations.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
1 Docs
  • SKILL.md Primary doc