Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties.
Generate creative code names and encode/decode secret messages using classic and sophisticated ciphers. Blends nostalgic decoder ring fun with modern cryptographic techniques. Includes Caesar, Vigenère, Polybius, Rail Fence, and hybrid methods. Provides keys for secure message sharing between trusted parties.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
SecretCodex brings back the magic of decoder rings from your childhood cereal boxes, but with the sophistication of modern cryptography. Generate creative code names for operations and team members, encode secret messages using multiple cipher methods, and decode messages from trusted contacts—all with keys that you control and share manually with intended recipients. Perfect for: 🎯 Creating code names for projects, operations, or team members 🔒 Sending secret messages between friends, family, or team 🎓 Learning cryptography through hands-on practice 🎮 Adding mystery to games, scavenger hunts, or puzzles 🎪 Fun challenges and brain teasers 📝 Private notes that only you (and your key-holders) can read
Security through obscurity is weak. Security through strong ciphers + key management is powerful. SecretCodex teaches you both: Simple ciphers (fun, educational, quick) Sophisticated ciphers (stronger, layered, secure) Hybrid methods (combine multiple techniques) Key management (the real secret to cryptography)
Before you encode messages, you need great code names! SecretCodex generates creative, memorable names for operations, projects, or individuals.
Operation Names (Mission/Project Codenames) Format: [Adjective] + [Noun] Examples: Operation Silent Thunder Operation Crimson Falcon Operation Midnight Protocol Operation Steel Horizon Operation Quantum Shield Generation Strategy: Choose a tone (stealthy, powerful, technical, natural, mythical) Pair evocative adjective with strong noun Avoid obvious connections to actual project Personal Codenames (Agent/Team Member Names) Format: Single word or [Title] + [Element] Examples: Phoenix (rebirth, fire) Cipher (encryption, secrecy) Raven (intelligence, mystery) Atlas (strength, reliability) Echo (communication, repetition) Agent Frost (cool, calculated) The Architect (strategic, builder) Generation Strategy: Consider person's role or traits Use animals, elements, concepts, or titles Make it memorable and easy to say Location Codenames Format: Geographic-sounding but fictional Examples: Raven's Point (meeting location) Glacier Station (server location) Meridian Hub (coordination center)
User provides: Type (operation, person, location) Tone (serious, playful, technical, mysterious) Optional themes (nature, technology, mythology, colors) SecretCodex generates: 5-10 options with meanings Phonetic spellings (for radio clarity) Alternatives if first choice is compromised Example: User: "Generate a code name for our Q1 product launch project. Tone: Exciting but professional." SecretCodex: CODE NAME OPTIONS: 1. Operation Silver Dawn - Silver: Premium, valuable, reflective - Dawn: New beginning, fresh start - Phonetic: SILVER DON - Use case: "Silver Dawn is go for launch" 2. Project Velocity Edge - Velocity: Speed, momentum, progress - Edge: Cutting-edge, advantage, boundary - Phonetic: vuh-LOSS-ih-tee EDJ 3. Initiative Catalyst Prime - Catalyst: Trigger change, accelerate - Prime: First-class, optimal, ready 4. Operation Horizon Shift - Horizon: Future, vision, expansion - Shift: Change, transformation 5. Project Apex Launch - Apex: Peak, highest point, summit - Launch: Beginning, deployment Recommendation: "Operation Silver Dawn" - Professional, aspirational, easy to remember and say.
How it works: Shift each letter forward or backward in the alphabet by a fixed number. Key: Shift amount (1-25) Example: Plaintext: MEET ME AT NOON Key: Shift 3 Ciphertext: PHHW PH DW QRRQ M → P (shift 3) E → H (shift 3) E → H (shift 3) T → W (shift 3) Decoding: Shift backward by the same amount. Strength: ⭐☆☆☆☆ (Very weak - only 25 possible keys) Best for: Kids, quick messages, nostalgia
How it works: Special case of Caesar cipher with shift of 13. Encoding = Decoding (symmetric). Key: None needed (always shift 13) Example: Plaintext: SECRET MESSAGE Ciphertext: FRPERG ZRFFNTR S → F (shift 13) E → R (shift 13) ... Strength: ⭐☆☆☆☆ (Very weak - single fixed key) Best for: Quick obfuscation, forum spoilers, simple hiding
How it works: Replace A with Z, B with Y, C with X, etc. (reverse alphabet) Key: None (fixed pattern) Example: Plaintext: HIDDEN Ciphertext: SRWWVM H → S (A=Z, B=Y, ... H=S) I → R D → W D → W E → V N → M Strength: ⭐☆☆☆☆ (Very weak - no key variation) Best for: Quick reversal, simple codes
How it works: Replace letters with geometric symbols based on grids. Key: Grid arrangement (standard or custom) Grid Pattern: # Grid 1: # Grid 2: A|B|C J|K|L -+-+- -+-+- D|E|F M|N|O -+-+- -+-+- G|H|I P|Q|R # X-Grid 1: # X-Grid 2: S T W X X X U V Y Z Example: Plaintext: HELLO Symbols: [H][E][L][L][O] H = bottom-left of first grid E = middle of first grid L = top-right of second grid L = top-right of second grid O = middle of second grid Strength: ⭐⭐☆☆☆ (Weak - pattern recognition) Best for: Visual encoding, kids, scavenger hunts
How it works: Letters arranged in 5×5 grid (I/J combined). Each letter = row + column. Key: Grid arrangement (can be scrambled) Standard Grid: 1 2 3 4 5 1 A B C D E 2 F G H I/J K 3 L M N O P 4 Q R S T U 5 V W X Y Z Example: Plaintext: ATTACK Ciphertext: 11 44 44 11 13 25 A = row 1, col 1 = 11 T = row 4, col 4 = 44 T = row 4, col 4 = 44 A = row 1, col 1 = 11 C = row 1, col 3 = 13 K = row 2, col 5 = 25 Strength: ⭐⭐☆☆☆ (Weak alone, strong when combined) Best for: Numeric encoding, combining with other methods
How it works: Like Caesar but the shift changes for each letter based on a keyword. Key: Keyword or phrase (longer = stronger) Example: Plaintext: ATTACK AT DAWN Key: SECRETSECRETSE Ciphertext: SXVRGD SX HSAS A + S = S (0+18 mod 26) T + E = X (19+4 mod 26) T + C = V (19+2 mod 26) A + R = R (0+17 mod 26) C + E = G (2+4 mod 26) K + T = D (10+19 mod 26) ... Vigenère Square (for reference): A B C D E F ... A | A B C D E F ... B | B C D E F G ... C | C D E F G H ... ... (26×26 grid) Decoding: Use keyword to shift backward. Strength: ⭐⭐⭐☆☆ (Moderate - strong if long keyword) Best for: Keyword-based secrecy, shared phrase keys
How it works: Write message in zigzag pattern across multiple rails, read off by rows. Key: Number of rails (2-10) Example with 3 rails: Plaintext: THISISASECRET Writing pattern (3 rails): T . . . S . . . E . . . T Rail 1: T S E T . H . S . I . A . S . C . E Rail 2: H S I A S C E . . I . . . S . . . R . . Rail 3: I S R Ciphertext: TSET HSIASECE ISR (read row by row) Compact: TSETHSIASCEEISR Decoding: Know number of rails, reverse the zigzag write. Strength: ⭐⭐☆☆☆ (Weak - pattern-based) Best for: Visual rearrangement, combining with substitution
How it works: Encrypt pairs of letters using a 5×5 keyed grid. Much stronger than single-letter substitution. Key: Keyword creates the grid Grid Creation: Write keyword (remove duplicates) Fill rest with unused alphabet letters Combine I/J Example with keyword "MONARCHY": M O N A R C H Y B D E F G I/J K L P Q S T U V W X Z Encryption Rules: If both letters in same row: shift right If both in same column: shift down If forming rectangle: swap corners Example: Plaintext: HE LL OW OR LD (pairs) Key: MONARCHY HE: H=row2,col2 E=row3,col1 → Rectangle → EB LL: L=row4,col1 L=row4,col1 → Insert X: LX → LXLX OW: O=row1,col2 W=row5,col3 → Rectangle → AZ OR: O=row1,col2 R=row1,col5 → Same row → NA LD: L=row4,col1 D=row2,col5 → Rectangle → UD Ciphertext: EB LZ OL AZ NA UD Strength: ⭐⭐⭐⭐☆ (Strong - resists frequency analysis) Best for: Serious encoding, resisting decryption
How it works: Write message in rows, read columns in keyword-alphabetical order. Key: Keyword determines column order Example: Plaintext: ATTACK AT DAWN Key: ZEBRA (alphabetical: ABERZ = 52143) Write in 5 columns under keyword: Z E B R A --------- A T T A C K A T D A W N X X X (padding) Read columns in alphabetical order (A E B R Z): Column A (5): C A X Column E (2): T A N Column B (3): T T X Column R (4): A D X Column Z (1): A K W Ciphertext: CAXTANTТXADXAKW Compact: CAXTANTTXADXAKW Strength: ⭐⭐⭐☆☆ (Moderate - order is key) Best for: Scrambling message structure
How it works: Each message encrypted with truly random key, used only once, same length as message. Key: Random string same length as plaintext (MUST be truly random, MUST be used only once) Example: Plaintext: HELLO Key: XMCKL (truly random, never reused) H + X = E (7+23 mod 26) E + M = Q (4+12 mod 26) L + C = N (11+2 mod 26) L + K = V (11+10 mod 26) O + L = Z (14+11 mod 26) Ciphertext: EQNVZ CRITICAL: Key must be: Truly random (not pseudo-random) Same length as message Used only ONCE (hence "one-time") Securely shared ahead of time Strength: ⭐⭐⭐⭐⭐ (Perfect if used correctly) Best for: Maximum security (if you can manage true randomness and single-use keys)
Method: Apply two different ciphers sequentially Example: Vigenère + Rail Fence Step 1: Vigenère with keyword "FORTRESS" Plaintext: MEET ME AT THE BRIDGE Key: FORTRESSFORTRESSFO Result: RXJG ZR UG GUR VKWQTR Step 2: Rail Fence with 3 rails Input: RXJGZRUGGURVIIWQTR Output: RJZGRTVR XGUGUKWT RI (rail-encoded) Final Ciphertext: RJZGRTVХGUGUKWTГRI Decoding: Reverse order (Rail Fence first, then Vigenère) Strength: ⭐⭐⭐⭐☆ (Much stronger than either alone)
Method: Convert to numbers, then shift with keyword Example: Step 1: Polybius Square Plaintext: HELLO Numbers: 23 15 31 31 34 Step 2: Vigenère on Numbers Key: SECRET = 18 14 12 17 14 19 Add key to numbers (mod 100): 23+18=41, 15+14=29, 31+12=43, 31+17=48, 34+14=48 Final Ciphertext: 41 29 43 48 48 Strength: ⭐⭐⭐⭐☆ (Numeric + alphabetic layers)
The most important part of cryptography: KEY MANAGEMENT
1. Shift/Rotation Keys (Simple) Number (1-25 for Caesar) Direction (forward/backward) Example: "ROT13", "Shift +7" 2. Keyword Keys (Intermediate) Word or phrase Longer = stronger Memorable but not obvious Example: "FORTRESS", "PURPLE ELEPHANT" 3. Random Keys (Advanced) Truly random characters One-time use (OTP) Must be securely shared Example: "XQPVHGKLMNZRT" 4. Grid/Pattern Keys (Visual) Grid arrangement (Polybius, Playfair) Symbol mapping (Pigpen variants) Example: "Grid arranged by keyword MONARCH"
How to share your key securely: In-Person Exchange (Most secure) Whisper the key Write on paper, watch them memorize, destroy paper Use pre-arranged code phrases Separate Channel (Good) Send encrypted message via email Send key via text message (different platform) Never both on same channel Pre-Arranged Keys (Best for ongoing) Agree on keyword/pattern before separation Use shared secret (inside joke, date, location) Change periodically Physical Key Exchange (Creative) Hide key in letter, send via mail Encode key using simpler cipher Use drop location for key card Key Security Rules: ❌ Never send key with encrypted message on same channel ❌ Never reuse one-time pad keys ✅ Change keys regularly ✅ Destroy old keys after use ✅ Memorize when possible
Scenario: Creating secret clues for a treasure hunt. Solution: Clue 1 (Simple - Caesar Shift 5): Plaintext: LOOK UNDER THE OAK TREE Ciphertext: QTTP ZSIJW YMJ TPF YWJJ Clue 2 (Medium - Rail Fence 4 rails): Plaintext: THE TREASURE IS IN THE SHED Ciphertext: TEUEIHHE RSRSNSDE TISHETDR Clue 3 (Hard - Playfair with keyword HUNTER): Plaintext: FINAL PRIZE BEHIND DOOR TWO (Encrypted with Playfair) Ciphertext: GHPBM QXFBH CHAKMB ENNX VVS Each clue progressively harder, keys provided when previous clue found.
Scenario: You want to keep a journal that's private even if someone reads it. Solution: Method: Double Vigenère (two different keywords) First Pass: Plaintext: TODAY I LEARNED SOMETHING IMPORTANT Key 1: JOURNAL Ciphertext 1: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV Second Pass: Plaintext: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV Key 2: PRIVATE Ciphertext 2: RVPCQ G KXIGXFT SGDTHSOTZ EIAXQVYOX Final encrypted entry goes in journal. Only you know both keys to decrypt.
Challenge 1: Caesar Cipher Encrypted: WKLV LV D VHFUHW PHVVDJH Hint: Shift is 3 Decrypt it! Answer: THIS IS A SECRET MESSAGE Challenge 2: Atbash Encrypted: HXVVGH HLFGS What does it say? Answer: SUMMER NIGHT (H→S, X→C, etc.)
Challenge 3: Vigenère Encrypted: YXPKI HS ASWZE Keyword: LOCK Decrypt it! Answer: OPENS AT SEVEN Challenge 4: Rail Fence (3 rails) Encrypted: TETYESCESGA HEEARMSE Decrypt it! Answer: THE SECRET MESSAGE (written in zigzag)
Challenge 5: Playfair Encrypted: FD EO OA TP ED ND RP Keyword: EXAMPLE Decrypt it! (Remember digraph rules) Answer: HIDDEN CHAMBER (requires Playfair decoding)
Quick & Fun (Minutes): Caesar/ROT13: Casual messages, quick hiding Atbash: Simple reversal Pigpen: Visual fun, scavenger hunts Moderate Security (Hours to crack): Vigenère: Keyword-based secrecy Polybius: Numeric encoding Rail Fence: Pattern scrambling Strong Security (Days/weeks to crack): Playfair: Digraph substitution Columnar Transposition: Keyword ordering Double encryption: Layered methods Maximum Security (Theoretically unbreakable): One-Time Pad: True randomness + single use ONLY if you can ensure truly random keys and perfect key management
CipherStrengthSpeedKey TypeBest ForCaesar⭐FastNumberKids, quickAtbash⭐FastNoneReversalPigpen⭐⭐MediumPatternVisualVigenère⭐⭐⭐MediumKeywordShared secretsPolybius⭐⭐MediumGridNumbersRail Fence⭐⭐MediumNumberScramblingPlayfair⭐⭐⭐⭐SlowKeywordStrong encryptionOTP⭐⭐⭐⭐⭐MediumRandomMaximum securityHybrid⭐⭐⭐⭐SlowMultipleLayered protection
✅ Educational cryptography tool ✅ Fun way to learn cipher techniques ✅ Practical for casual secret messages ✅ Great for games, puzzles, scavenger hunts ✅ Introduction to key management concepts
❌ Not a replacement for modern encryption (AES, RSA, etc.) ❌ Not suitable for truly sensitive data (use proper encryption software) ❌ Not protection against determined adversaries ❌ Not a substitute for secure communication platforms
Financial information Personal identification data Medical records Legal documents Business secrets Anything truly confidential For those use cases: Use AES-256, RSA, or encrypted messaging apps (Signal, WhatsApp, etc.) SecretCodex is for: Learning cryptography Fun secret messages Casual privacy Educational purposes Nostalgia and enjoyment
Use SecretCodex when you want to: Generate creative code names for operations/teams/locations Encode a secret message to a friend or family member Decode a message someone sent you (if you have the key) Learn how different ciphers work Create puzzle challenges or scavenger hunts Add mystery to games or role-playing Practice cryptographic thinking Have nostalgic decoder ring fun with modern sophistication Remember: The strength of encryption isn't just the algorithm—it's the key. Protect your keys, share them wisely, and change them often! 🔐 "In cryptography, we trust... but only with good key management!" 🔐
Messaging, meetings, inboxes, CRM, and teammate communication surfaces.
Largest current source with strong distribution and engagement signals.