# Send Redshift to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "redshift",
    "name": "Redshift",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/accolver/redshift",
    "canonicalUrl": "https://clawhub.ai/accolver/redshift",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/redshift",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=redshift",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "redshift",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-08T01:59:11.425Z",
      "expiresAt": "2026-05-15T01:59:11.425Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=redshift",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=redshift",
        "contentDisposition": "attachment; filename=\"redshift-0.2.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "redshift"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/redshift"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/redshift",
    "downloadUrl": "https://openagent3.xyz/downloads/redshift",
    "agentUrl": "https://openagent3.xyz/skills/redshift/agent",
    "manifestUrl": "https://openagent3.xyz/skills/redshift/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/redshift/agent.md"
  }
}
```
## Documentation

### Redshift

Decentralized secret management via the redshift CLI. Secrets are client-side encrypted (NIP-59 Gift Wrap) and stored on Nostr relays — no central server.

Project homepage: https://redshiftapp.com

### Key concepts

Project (-p): a project slug (e.g. backend, myapp)
Config/Environment (-c): an environment slug (e.g. dev, staging, production)
redshift.yaml: per-directory project config created by redshift setup
When -p/-c are omitted, Redshift reads from redshift.yaml in the current directory

### Security considerations

Never pass secret values directly on the command line in shared/logged environments — prefer redshift secrets set interactively or pipe from stdin
Use REDSHIFT_NSEC / REDSHIFT_BUNKER env vars for CI/CD rather than CLI flags
Avoid redshift serve --host 0.0.0.0 unless you intend to expose the web UI to the network — default 127.0.0.1 is localhost-only
All encryption is client-side; secrets never leave the device unencrypted
Private keys are stored in the system keychain, not in plaintext config files

### Authentication

redshift login                    # Interactive (recommended)
redshift login --nsec nsec1...    # Direct private key (use env var in CI instead)
redshift login --bunker "bunker://pubkey?relay=wss://relay.example&secret=xxx"  # NIP-46 (ALWAYS quote the URL)
redshift login --connect          # Generate NostrConnect URI for bunker app
redshift me                       # Check current identity
redshift logout                   # Clear credentials

CI/CD: set REDSHIFT_NSEC or REDSHIFT_BUNKER env vars instead of redshift login. These should be stored in your CI platform's secret management (e.g. GitHub Actions secrets), never hardcoded.

### Project setup

redshift setup                                  # Interactive
redshift setup -p myapp -c production           # Non-interactive
redshift setup --no-interactive -p app -c dev   # Strict non-interactive

Creates redshift.yaml with project, environment, and relay list.

### Secrets

# List all
redshift secrets                          # Redacted values
redshift secrets --raw                    # Show plaintext values
redshift secrets --json                   # JSON output
redshift secrets --only-names             # Names only

# Get
redshift secrets get API_KEY
redshift secrets get API_KEY --plain      # Raw value, no formatting
redshift secrets get API_KEY --copy       # Copy to clipboard
redshift secrets get KEY1 KEY2            # Multiple keys

# Set
redshift secrets set API_KEY sk_live_xxx
redshift secrets set API_KEY '123' DB_URL 'postgres://...'    # Multiple at once

# Delete
redshift secrets delete OLD_KEY
redshift secrets delete KEY1 KEY2 -y      # Skip confirmation

# Download
redshift secrets download ./secrets.json                     # JSON (default)
redshift secrets download --format=env --no-file             # Print .env to stdout
redshift secrets download --format=env ./secrets.env         # Save as .env file
# Formats: json, env, yaml, docker, env-no-quotes

# Upload
redshift secrets upload secrets.env

Override project/environment on any secrets command with -p / -c:

redshift secrets -p backend -c production --raw
redshift secrets set -p myapp -c staging FEATURE_FLAG true

### Run with secrets injected

Important: Only run commands the user has explicitly requested. Never construct arbitrary commands to pass to redshift run. Always confirm the command with the user before executing.

redshift run -- npm start
redshift run -- python app.py
redshift run --command "npm start && npm test"
redshift run -p myapp -c prod -- docker-compose up

# Mount secrets to a file instead of env vars
redshift run --mount secrets.json -- cat secrets.json
redshift run --mount secrets.env --mount-format env -- cat secrets.env

# Fallback for offline mode
redshift run --fallback ./fallback.json -- npm start
redshift run --fallback-only -- npm start          # Read only from fallback

# Preserve existing env values for specific keys
redshift run --preserve-env PORT,HOST -- npm start

### Configuration

redshift configure                    # Show config
redshift configure --all              # Show all saved options
redshift configure get project        # Get specific option
redshift configure set project=myapp  # Set option
redshift configure unset project      # Remove option
redshift configure reset --yes        # Reset to initial state

### Web UI

redshift serve                        # http://127.0.0.1:3000 (localhost only)
redshift serve --port 8080 --open     # Custom port, auto-open browser
redshift serve --host 0.0.0.0         # ⚠️ Exposes to network — use with caution

### Global flags

FlagShortDescription--help-hShow help--version-vShow version--jsonJSON output--silentSuppress info messages--debugVerbose debug output--config-dirOverride config dir (~/.redshift)

### Environment variables

VariableDescriptionREDSHIFT_NSECPrivate key for CI/CD (bypasses interactive login)REDSHIFT_BUNKERNIP-46 bunker URL for CI/CD (alternative to nsec)REDSHIFT_CONFIG_DIROverride config directory (default: ~/.redshift)

### Important notes

Always quote bunker URLs (--bunker "bunker://...") — shell interprets & otherwise
Secret values with spaces or special chars should be quoted
Complex values (objects/arrays) are auto-JSON-stringified when injected by redshift run
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: accolver
- Version: 0.2.0
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-05-08T01:59:11.425Z
- Expires at: 2026-05-15T01:59:11.425Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/redshift)
- [Send to Agent page](https://openagent3.xyz/skills/redshift/agent)
- [JSON manifest](https://openagent3.xyz/skills/redshift/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/redshift/agent.md)
- [Download page](https://openagent3.xyz/downloads/redshift)