{
  "schemaVersion": "1.0",
  "item": {
    "slug": "secretcodex",
    "name": "SecretCodex",
    "source": "tencent",
    "type": "skill",
    "category": "通讯协作",
    "sourceUrl": "https://clawhub.ai/akhmittra/secretcodex",
    "canonicalUrl": "https://clawhub.ai/akhmittra/secretcodex",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/secretcodex",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=secretcodex",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "README.md",
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "slug": "secretcodex",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-01T06:54:50.653Z",
      "expiresAt": "2026-05-08T06:54:50.653Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=secretcodex",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=secretcodex",
        "contentDisposition": "attachment; filename=\"secretcodex-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "secretcodex"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/secretcodex"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/secretcodex",
    "agentPageUrl": "https://openagent3.xyz/skills/secretcodex/agent",
    "manifestUrl": "https://openagent3.xyz/skills/secretcodex/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/secretcodex/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Description",
        "body": "SecretCodex brings back the magic of decoder rings from your childhood cereal boxes, but with the sophistication of modern cryptography. Generate creative code names for operations and team members, encode secret messages using multiple cipher methods, and decode messages from trusted contacts—all with keys that you control and share manually with intended recipients.\n\nPerfect for:\n\n🎯 Creating code names for projects, operations, or team members\n🔒 Sending secret messages between friends, family, or team\n🎓 Learning cryptography through hands-on practice\n🎮 Adding mystery to games, scavenger hunts, or puzzles\n🎪 Fun challenges and brain teasers\n📝 Private notes that only you (and your key-holders) can read"
      },
      {
        "title": "Core Philosophy",
        "body": "Security through obscurity is weak. Security through strong ciphers + key management is powerful.\n\nSecretCodex teaches you both:\n\nSimple ciphers (fun, educational, quick)\nSophisticated ciphers (stronger, layered, secure)\nHybrid methods (combine multiple techniques)\nKey management (the real secret to cryptography)"
      },
      {
        "title": "1. Code Name Generator",
        "body": "Before you encode messages, you need great code names! SecretCodex generates creative, memorable names for operations, projects, or individuals."
      },
      {
        "title": "Code Name Styles",
        "body": "Operation Names (Mission/Project Codenames)\n\nFormat: [Adjective] + [Noun]\n\nExamples:\n\nOperation Silent Thunder\nOperation Crimson Falcon\nOperation Midnight Protocol\nOperation Steel Horizon\nOperation Quantum Shield\n\nGeneration Strategy:\n\nChoose a tone (stealthy, powerful, technical, natural, mythical)\nPair evocative adjective with strong noun\nAvoid obvious connections to actual project\n\nPersonal Codenames (Agent/Team Member Names)\n\nFormat: Single word or [Title] + [Element]\n\nExamples:\n\nPhoenix (rebirth, fire)\nCipher (encryption, secrecy)\nRaven (intelligence, mystery)\nAtlas (strength, reliability)\nEcho (communication, repetition)\nAgent Frost (cool, calculated)\nThe Architect (strategic, builder)\n\nGeneration Strategy:\n\nConsider person's role or traits\nUse animals, elements, concepts, or titles\nMake it memorable and easy to say\n\nLocation Codenames\n\nFormat: Geographic-sounding but fictional\n\nExamples:\n\nRaven's Point (meeting location)\nGlacier Station (server location)\nMeridian Hub (coordination center)"
      },
      {
        "title": "Code Name Generation Process",
        "body": "User provides:\n\nType (operation, person, location)\nTone (serious, playful, technical, mysterious)\nOptional themes (nature, technology, mythology, colors)\n\nSecretCodex generates:\n\n5-10 options with meanings\nPhonetic spellings (for radio clarity)\nAlternatives if first choice is compromised\n\nExample:\n\nUser: \"Generate a code name for our Q1 product launch project. Tone: Exciting but professional.\"\n\nSecretCodex:\n\nCODE NAME OPTIONS:\n\n1. Operation Silver Dawn\n   - Silver: Premium, valuable, reflective\n   - Dawn: New beginning, fresh start\n   - Phonetic: SILVER DON\n   - Use case: \"Silver Dawn is go for launch\"\n\n2. Project Velocity Edge\n   - Velocity: Speed, momentum, progress\n   - Edge: Cutting-edge, advantage, boundary\n   - Phonetic: vuh-LOSS-ih-tee EDJ\n   \n3. Initiative Catalyst Prime\n   - Catalyst: Trigger change, accelerate\n   - Prime: First-class, optimal, ready\n   \n4. Operation Horizon Shift\n   - Horizon: Future, vision, expansion\n   - Shift: Change, transformation\n\n5. Project Apex Launch\n   - Apex: Peak, highest point, summit\n   - Launch: Beginning, deployment\n\nRecommendation: \"Operation Silver Dawn\" - \nProfessional, aspirational, easy to remember and say."
      },
      {
        "title": "Caesar Cipher (Alphabetic Shift)",
        "body": "How it works:\nShift each letter forward or backward in the alphabet by a fixed number.\n\nKey: Shift amount (1-25)\n\nExample:\n\nPlaintext: MEET ME AT NOON\nKey: Shift 3\nCiphertext: PHHW PH DW QRRQ\n\nM → P (shift 3)\nE → H (shift 3)\nE → H (shift 3)\nT → W (shift 3)\n\nDecoding:\nShift backward by the same amount.\n\nStrength: ⭐☆☆☆☆ (Very weak - only 25 possible keys)\nBest for: Kids, quick messages, nostalgia"
      },
      {
        "title": "ROT13 (Caesar Shift by 13)",
        "body": "How it works:\nSpecial case of Caesar cipher with shift of 13. Encoding = Decoding (symmetric).\n\nKey: None needed (always shift 13)\n\nExample:\n\nPlaintext: SECRET MESSAGE\nCiphertext: FRPERG ZRFFNTR\n\nS → F (shift 13)\nE → R (shift 13)\n...\n\nStrength: ⭐☆☆☆☆ (Very weak - single fixed key)\nBest for: Quick obfuscation, forum spoilers, simple hiding"
      },
      {
        "title": "Atbash Cipher (Reverse Alphabet)",
        "body": "How it works:\nReplace A with Z, B with Y, C with X, etc. (reverse alphabet)\n\nKey: None (fixed pattern)\n\nExample:\n\nPlaintext: HIDDEN\nCiphertext: SRWWVM\n\nH → S (A=Z, B=Y, ... H=S)\nI → R\nD → W\nD → W\nE → V\nN → M\n\nStrength: ⭐☆☆☆☆ (Very weak - no key variation)\nBest for: Quick reversal, simple codes"
      },
      {
        "title": "Pigpen Cipher (Symbol Substitution)",
        "body": "How it works:\nReplace letters with geometric symbols based on grids.\n\nKey: Grid arrangement (standard or custom)\n\nGrid Pattern:\n\n# Grid 1:        # Grid 2:\n    A|B|C           J|K|L\n   -+-+-           -+-+-\n    D|E|F           M|N|O\n   -+-+-           -+-+-\n    G|H|I           P|Q|R\n\n# X-Grid 1:     # X-Grid 2:\n   S   T            W   X\n     X              X\n   U   V            Y   Z\n\nExample:\n\nPlaintext: HELLO\nSymbols: [H][E][L][L][O]\n\nH = bottom-left of first grid\nE = middle of first grid\nL = top-right of second grid\nL = top-right of second grid\nO = middle of second grid\n\nStrength: ⭐⭐☆☆☆ (Weak - pattern recognition)\nBest for: Visual encoding, kids, scavenger hunts"
      },
      {
        "title": "Polybius Square (Grid Coordinates)",
        "body": "How it works:\nLetters arranged in 5×5 grid (I/J combined). Each letter = row + column.\n\nKey: Grid arrangement (can be scrambled)\n\nStandard Grid:\n\n1 2 3 4 5\n1 A B C D E\n2 F G H I/J K\n3 L M N O P\n4 Q R S T U\n5 V W X Y Z\n\nExample:\n\nPlaintext: ATTACK\nCiphertext: 11 44 44 11 13 25\n\nA = row 1, col 1 = 11\nT = row 4, col 4 = 44\nT = row 4, col 4 = 44\nA = row 1, col 1 = 11\nC = row 1, col 3 = 13\nK = row 2, col 5 = 25\n\nStrength: ⭐⭐☆☆☆ (Weak alone, strong when combined)\nBest for: Numeric encoding, combining with other methods"
      },
      {
        "title": "Vigenère Cipher (Keyword-Based Shift)",
        "body": "How it works:\nLike Caesar but the shift changes for each letter based on a keyword.\n\nKey: Keyword or phrase (longer = stronger)\n\nExample:\n\nPlaintext: ATTACK AT DAWN\nKey:       SECRETSECRETSE\nCiphertext: SXVRGD SX HSAS\n\nA + S = S (0+18 mod 26)\nT + E = X (19+4 mod 26)\nT + C = V (19+2 mod 26)\nA + R = R (0+17 mod 26)\nC + E = G (2+4 mod 26)\nK + T = D (10+19 mod 26)\n...\n\nVigenère Square (for reference):\n\nA B C D E F ...\nA | A B C D E F ...\nB | B C D E F G ...\nC | C D E F G H ...\n... (26×26 grid)\n\nDecoding:\nUse keyword to shift backward.\n\nStrength: ⭐⭐⭐☆☆ (Moderate - strong if long keyword)\nBest for: Keyword-based secrecy, shared phrase keys"
      },
      {
        "title": "Rail Fence Cipher (Transposition)",
        "body": "How it works:\nWrite message in zigzag pattern across multiple rails, read off by rows.\n\nKey: Number of rails (2-10)\n\nExample with 3 rails:\n\nPlaintext: THISISASECRET\n\nWriting pattern (3 rails):\nT . . . S . . . E . . . T     Rail 1: T S E T\n. H . S . I . A . S . C . E   Rail 2: H S I A S C E\n. . I . . . S . . . R . .     Rail 3: I S R\n\nCiphertext: TSET HSIASECE ISR (read row by row)\nCompact: TSETHSIASCEEISR\n\nDecoding:\nKnow number of rails, reverse the zigzag write.\n\nStrength: ⭐⭐☆☆☆ (Weak - pattern-based)\nBest for: Visual rearrangement, combining with substitution"
      },
      {
        "title": "Playfair Cipher (Digraph Substitution)",
        "body": "How it works:\nEncrypt pairs of letters using a 5×5 keyed grid. Much stronger than single-letter substitution.\n\nKey: Keyword creates the grid\n\nGrid Creation:\n\nWrite keyword (remove duplicates)\nFill rest with unused alphabet letters\nCombine I/J\n\nExample with keyword \"MONARCHY\":\n\nM O N A R\nC H Y B D\nE F G I/J K\nL P Q S T\nU V W X Z\n\nEncryption Rules:\n\nIf both letters in same row: shift right\nIf both in same column: shift down\nIf forming rectangle: swap corners\n\nExample:\n\nPlaintext: HE LL OW OR LD (pairs)\nKey: MONARCHY\n\nHE: H=row2,col2 E=row3,col1 → Rectangle → EB\nLL: L=row4,col1 L=row4,col1 → Insert X: LX → LXLX\nOW: O=row1,col2 W=row5,col3 → Rectangle → AZ\nOR: O=row1,col2 R=row1,col5 → Same row → NA\nLD: L=row4,col1 D=row2,col5 → Rectangle → UD\n\nCiphertext: EB LZ OL AZ NA UD\n\nStrength: ⭐⭐⭐⭐☆ (Strong - resists frequency analysis)\nBest for: Serious encoding, resisting decryption"
      },
      {
        "title": "Columnar Transposition (Keyword-Ordered)",
        "body": "How it works:\nWrite message in rows, read columns in keyword-alphabetical order.\n\nKey: Keyword determines column order\n\nExample:\n\nPlaintext: ATTACK AT DAWN\nKey: ZEBRA (alphabetical: ABERZ = 52143)\n\nWrite in 5 columns under keyword:\nZ E B R A\n---------\nA T T A C\nK A T D A\nW N X X X (padding)\n\nRead columns in alphabetical order (A E B R Z):\nColumn A (5): C A X\nColumn E (2): T A N\nColumn B (3): T T X\nColumn R (4): A D X\nColumn Z (1): A K W\n\nCiphertext: CAXTANTТXADXAKW\nCompact: CAXTANTTXADXAKW\n\nStrength: ⭐⭐⭐☆☆ (Moderate - order is key)\nBest for: Scrambling message structure"
      },
      {
        "title": "One-Time Pad (Theoretically Unbreakable)",
        "body": "How it works:\nEach message encrypted with truly random key, used only once, same length as message.\n\nKey: Random string same length as plaintext (MUST be truly random, MUST be used only once)\n\nExample:\n\nPlaintext: HELLO\nKey:       XMCKL (truly random, never reused)\n\nH + X = E (7+23 mod 26)\nE + M = Q (4+12 mod 26)\nL + C = N (11+2 mod 26)\nL + K = V (11+10 mod 26)\nO + L = Z (14+11 mod 26)\n\nCiphertext: EQNVZ\n\nCRITICAL: Key must be:\n\nTruly random (not pseudo-random)\nSame length as message\nUsed only ONCE (hence \"one-time\")\nSecurely shared ahead of time\n\nStrength: ⭐⭐⭐⭐⭐ (Perfect if used correctly)\nBest for: Maximum security (if you can manage true randomness and single-use keys)"
      },
      {
        "title": "Double Encryption (Two-Step Process)",
        "body": "Method: Apply two different ciphers sequentially\n\nExample: Vigenère + Rail Fence\n\nStep 1: Vigenère with keyword \"FORTRESS\"\nPlaintext: MEET ME AT THE BRIDGE\nKey: FORTRESSFORTRESSFO\nResult: RXJG ZR UG GUR VKWQTR\n\nStep 2: Rail Fence with 3 rails\nInput: RXJGZRUGGURVIIWQTR\nOutput: RJZGRTVR XGUGUKWT RI (rail-encoded)\n\nFinal Ciphertext: RJZGRTVХGUGUKWTГRI\n\nDecoding: Reverse order (Rail Fence first, then Vigenère)\n\nStrength: ⭐⭐⭐⭐☆ (Much stronger than either alone)"
      },
      {
        "title": "Polybius + Vigenère",
        "body": "Method: Convert to numbers, then shift with keyword\n\nExample:\n\nStep 1: Polybius Square\nPlaintext: HELLO\nNumbers: 23 15 31 31 34\n\nStep 2: Vigenère on Numbers\nKey: SECRET = 18 14 12 17 14 19\nAdd key to numbers (mod 100):\n23+18=41, 15+14=29, 31+12=43, 31+17=48, 34+14=48\n\nFinal Ciphertext: 41 29 43 48 48\n\nStrength: ⭐⭐⭐⭐☆ (Numeric + alphabetic layers)"
      },
      {
        "title": "6. Key Generation & Management",
        "body": "The most important part of cryptography: KEY MANAGEMENT"
      },
      {
        "title": "Key Types",
        "body": "1. Shift/Rotation Keys (Simple)\n\nNumber (1-25 for Caesar)\nDirection (forward/backward)\nExample: \"ROT13\", \"Shift +7\"\n\n2. Keyword Keys (Intermediate)\n\nWord or phrase\nLonger = stronger\nMemorable but not obvious\nExample: \"FORTRESS\", \"PURPLE ELEPHANT\"\n\n3. Random Keys (Advanced)\n\nTruly random characters\nOne-time use (OTP)\nMust be securely shared\nExample: \"XQPVHGKLMNZRT\"\n\n4. Grid/Pattern Keys (Visual)\n\nGrid arrangement (Polybius, Playfair)\nSymbol mapping (Pigpen variants)\nExample: \"Grid arranged by keyword MONARCH\""
      },
      {
        "title": "Key Sharing Methods (Manual)",
        "body": "How to share your key securely:\n\nIn-Person Exchange (Most secure)\n\nWhisper the key\nWrite on paper, watch them memorize, destroy paper\nUse pre-arranged code phrases\n\n\n\nSeparate Channel (Good)\n\nSend encrypted message via email\nSend key via text message (different platform)\nNever both on same channel\n\n\n\nPre-Arranged Keys (Best for ongoing)\n\nAgree on keyword/pattern before separation\nUse shared secret (inside joke, date, location)\nChange periodically\n\n\n\nPhysical Key Exchange (Creative)\n\nHide key in letter, send via mail\nEncode key using simpler cipher\nUse drop location for key card\n\nKey Security Rules:\n\n❌ Never send key with encrypted message on same channel\n❌ Never reuse one-time pad keys\n✅ Change keys regularly\n✅ Destroy old keys after use\n✅ Memorize when possible"
      },
      {
        "title": "Example 1: Secret Meeting Coordination",
        "body": "Scenario: You need to tell your friend where and when to meet, but you're communicating in a public group chat.\n\nSolution:\n\nCode Names:\n- You: \"Phoenix\"\n- Friend: \"Atlas\"\n- Meeting spot: \"Raven's Point\" (actually the north library entrance)\n- Time: Use Vigenère\n\nMessage Setup:\nPlaintext: MEET AT RAVENS POINT AT THREE PM\nCipher: Vigenère\nKey: FORTRESS (shared in-person last week)\n\nEncoding:\nM+F=R, E+O=S, E+R=V, T+T=M, ...\n\nEncrypted: RXJG UG KHEVLA UTVRM UG GLVJJ TZ\n\nSent Message:\n\"Phoenix to Atlas: RXJG UG KHEVLA UTVRM UG GLVJJ TZ\"\n\nFriend decodes using FORTRESS key → Meets you at Raven's Point (north library) at 3pm"
      },
      {
        "title": "Example 2: Scavenger Hunt Clues",
        "body": "Scenario: Creating secret clues for a treasure hunt.\n\nSolution:\n\nClue 1 (Simple - Caesar Shift 5):\nPlaintext: LOOK UNDER THE OAK TREE\nCiphertext: QTTP ZSIJW YMJ TPF YWJJ\n\nClue 2 (Medium - Rail Fence 4 rails):\nPlaintext: THE TREASURE IS IN THE SHED\nCiphertext: TEUEIHHE RSRSNSDE TISHETDR\n\nClue 3 (Hard - Playfair with keyword HUNTER):\nPlaintext: FINAL PRIZE BEHIND DOOR TWO\n(Encrypted with Playfair)\nCiphertext: GHPBM QXFBH CHAKMB ENNX VVS\n\nEach clue progressively harder, keys provided when previous clue found."
      },
      {
        "title": "Example 3: Private Journal Entries",
        "body": "Scenario: You want to keep a journal that's private even if someone reads it.\n\nSolution:\n\nMethod: Double Vigenère (two different keywords)\n\nFirst Pass:\nPlaintext: TODAY I LEARNED SOMETHING IMPORTANT\nKey 1: JOURNAL\nCiphertext 1: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV\n\nSecond Pass:\nPlaintext: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV\nKey 2: PRIVATE\nCiphertext 2: RVPCQ G KXIGXFT SGDTHSOTZ EIAXQVYOX\n\nFinal encrypted entry goes in journal.\nOnly you know both keys to decrypt."
      },
      {
        "title": "Example 4: Team Communication",
        "body": "Scenario: Remote team needs to share sensitive project info.\n\nSolution:\n\nCode Name System:\n- Project: \"Operation Silver Dawn\"\n- Team members: Phoenix, Atlas, Cipher, Raven\n- Milestones: Alpha, Bravo, Charlie, Delta\n\nSensitive Message Encoding:\nMethod: Columnar Transposition + Substitution\nKey: Team keyword \"SILVERDOWN\" (agreed in kickoff meeting)\n\nMessage:\n\"Phoenix reports Charlie milestone complete on schedule\"\n\nEncoded:\n\"PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN\"\n\nSent in Slack:\n\"SILVER: PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN\"\n\nTeam members decode using shared key."
      },
      {
        "title": "Beginner Challenges",
        "body": "Challenge 1: Caesar Cipher\n\nEncrypted: WKLV LV D VHFUHW PHVVDJH\nHint: Shift is 3\nDecrypt it!\n\nAnswer: THIS IS A SECRET MESSAGE\n\nChallenge 2: Atbash\n\nEncrypted: HXVVGH HLFGS\nWhat does it say?\n\nAnswer: SUMMER NIGHT (H→S, X→C, etc.)"
      },
      {
        "title": "Intermediate Challenges",
        "body": "Challenge 3: Vigenère\n\nEncrypted: YXPKI HS ASWZE\nKeyword: LOCK\nDecrypt it!\n\nAnswer: OPENS AT SEVEN\n\nChallenge 4: Rail Fence (3 rails)\n\nEncrypted: TETYESCESGA HEEARMSE\nDecrypt it!\n\nAnswer: THE SECRET MESSAGE (written in zigzag)"
      },
      {
        "title": "Advanced Challenges",
        "body": "Challenge 5: Playfair\n\nEncrypted: FD EO OA TP ED ND RP\nKeyword: EXAMPLE\nDecrypt it! (Remember digraph rules)\n\nAnswer: HIDDEN CHAMBER (requires Playfair decoding)"
      },
      {
        "title": "When to Use Which Cipher",
        "body": "Quick & Fun (Minutes):\n\nCaesar/ROT13: Casual messages, quick hiding\nAtbash: Simple reversal\nPigpen: Visual fun, scavenger hunts\n\nModerate Security (Hours to crack):\n\nVigenère: Keyword-based secrecy\nPolybius: Numeric encoding\nRail Fence: Pattern scrambling\n\nStrong Security (Days/weeks to crack):\n\nPlayfair: Digraph substitution\nColumnar Transposition: Keyword ordering\nDouble encryption: Layered methods\n\nMaximum Security (Theoretically unbreakable):\n\nOne-Time Pad: True randomness + single use\nONLY if you can ensure truly random keys and perfect key management"
      },
      {
        "title": "Cipher Comparison Matrix",
        "body": "CipherStrengthSpeedKey TypeBest ForCaesar⭐FastNumberKids, quickAtbash⭐FastNoneReversalPigpen⭐⭐MediumPatternVisualVigenère⭐⭐⭐MediumKeywordShared secretsPolybius⭐⭐MediumGridNumbersRail Fence⭐⭐MediumNumberScramblingPlayfair⭐⭐⭐⭐SlowKeywordStrong encryptionOTP⭐⭐⭐⭐⭐MediumRandomMaximum securityHybrid⭐⭐⭐⭐SlowMultipleLayered protection"
      },
      {
        "title": "What SecretCodex IS:",
        "body": "✅ Educational cryptography tool\n✅ Fun way to learn cipher techniques\n✅ Practical for casual secret messages\n✅ Great for games, puzzles, scavenger hunts\n✅ Introduction to key management concepts"
      },
      {
        "title": "What SecretCodex IS NOT:",
        "body": "❌ Not a replacement for modern encryption (AES, RSA, etc.)\n❌ Not suitable for truly sensitive data (use proper encryption software)\n❌ Not protection against determined adversaries\n❌ Not a substitute for secure communication platforms"
      },
      {
        "title": "When to Use Proper Encryption:",
        "body": "Financial information\nPersonal identification data\nMedical records\nLegal documents\nBusiness secrets\nAnything truly confidential\n\nFor those use cases: Use AES-256, RSA, or encrypted messaging apps (Signal, WhatsApp, etc.)\n\nSecretCodex is for:\n\nLearning cryptography\nFun secret messages\nCasual privacy\nEducational purposes\nNostalgia and enjoyment"
      },
      {
        "title": "When to Use This Skill",
        "body": "Use SecretCodex when you want to:\n\nGenerate creative code names for operations/teams/locations\nEncode a secret message to a friend or family member\nDecode a message someone sent you (if you have the key)\nLearn how different ciphers work\nCreate puzzle challenges or scavenger hunts\nAdd mystery to games or role-playing\nPractice cryptographic thinking\nHave nostalgic decoder ring fun with modern sophistication\n\nRemember: The strength of encryption isn't just the algorithm—it's the key. Protect your keys, share them wisely, and change them often!\n\n🔐 \"In cryptography, we trust... but only with good key management!\" 🔐"
      }
    ],
    "body": "SecretCodex\nDescription\n\nSecretCodex brings back the magic of decoder rings from your childhood cereal boxes, but with the sophistication of modern cryptography. Generate creative code names for operations and team members, encode secret messages using multiple cipher methods, and decode messages from trusted contacts—all with keys that you control and share manually with intended recipients.\n\nPerfect for:\n\n🎯 Creating code names for projects, operations, or team members\n🔒 Sending secret messages between friends, family, or team\n🎓 Learning cryptography through hands-on practice\n🎮 Adding mystery to games, scavenger hunts, or puzzles\n🎪 Fun challenges and brain teasers\n📝 Private notes that only you (and your key-holders) can read\nCore Philosophy\n\nSecurity through obscurity is weak. Security through strong ciphers + key management is powerful.\n\nSecretCodex teaches you both:\n\nSimple ciphers (fun, educational, quick)\nSophisticated ciphers (stronger, layered, secure)\nHybrid methods (combine multiple techniques)\nKey management (the real secret to cryptography)\n1. Code Name Generator\n\nBefore you encode messages, you need great code names! SecretCodex generates creative, memorable names for operations, projects, or individuals.\n\nCode Name Styles\nOperation Names (Mission/Project Codenames)\n\nFormat: [Adjective] + [Noun]\n\nExamples:\n\nOperation Silent Thunder\nOperation Crimson Falcon\nOperation Midnight Protocol\nOperation Steel Horizon\nOperation Quantum Shield\n\nGeneration Strategy:\n\nChoose a tone (stealthy, powerful, technical, natural, mythical)\nPair evocative adjective with strong noun\nAvoid obvious connections to actual project\nPersonal Codenames (Agent/Team Member Names)\n\nFormat: Single word or [Title] + [Element]\n\nExamples:\n\nPhoenix (rebirth, fire)\nCipher (encryption, secrecy)\nRaven (intelligence, mystery)\nAtlas (strength, reliability)\nEcho (communication, repetition)\nAgent Frost (cool, calculated)\nThe Architect (strategic, builder)\n\nGeneration Strategy:\n\nConsider person's role or traits\nUse animals, elements, concepts, or titles\nMake it memorable and easy to say\nLocation Codenames\n\nFormat: Geographic-sounding but fictional\n\nExamples:\n\nRaven's Point (meeting location)\nGlacier Station (server location)\nMeridian Hub (coordination center)\nCode Name Generation Process\n\nUser provides:\n\nType (operation, person, location)\nTone (serious, playful, technical, mysterious)\nOptional themes (nature, technology, mythology, colors)\n\nSecretCodex generates:\n\n5-10 options with meanings\nPhonetic spellings (for radio clarity)\nAlternatives if first choice is compromised\n\nExample:\n\nUser: \"Generate a code name for our Q1 product launch project. Tone: Exciting but professional.\"\n\nSecretCodex:\n\nCODE NAME OPTIONS:\n\n1. Operation Silver Dawn\n   - Silver: Premium, valuable, reflective\n   - Dawn: New beginning, fresh start\n   - Phonetic: SILVER DON\n   - Use case: \"Silver Dawn is go for launch\"\n\n2. Project Velocity Edge\n   - Velocity: Speed, momentum, progress\n   - Edge: Cutting-edge, advantage, boundary\n   - Phonetic: vuh-LOSS-ih-tee EDJ\n   \n3. Initiative Catalyst Prime\n   - Catalyst: Trigger change, accelerate\n   - Prime: First-class, optimal, ready\n   \n4. Operation Horizon Shift\n   - Horizon: Future, vision, expansion\n   - Shift: Change, transformation\n\n5. Project Apex Launch\n   - Apex: Peak, highest point, summit\n   - Launch: Beginning, deployment\n\nRecommendation: \"Operation Silver Dawn\" - \nProfessional, aspirational, easy to remember and say.\n\n2. Classic Ciphers (Decoder Ring Era)\nCaesar Cipher (Alphabetic Shift)\n\nHow it works: Shift each letter forward or backward in the alphabet by a fixed number.\n\nKey: Shift amount (1-25)\n\nExample:\n\nPlaintext: MEET ME AT NOON\nKey: Shift 3\nCiphertext: PHHW PH DW QRRQ\n\nM → P (shift 3)\nE → H (shift 3)\nE → H (shift 3)\nT → W (shift 3)\n\n\nDecoding: Shift backward by the same amount.\n\nStrength: ⭐☆☆☆☆ (Very weak - only 25 possible keys) Best for: Kids, quick messages, nostalgia\n\nROT13 (Caesar Shift by 13)\n\nHow it works: Special case of Caesar cipher with shift of 13. Encoding = Decoding (symmetric).\n\nKey: None needed (always shift 13)\n\nExample:\n\nPlaintext: SECRET MESSAGE\nCiphertext: FRPERG ZRFFNTR\n\nS → F (shift 13)\nE → R (shift 13)\n...\n\n\nStrength: ⭐☆☆☆☆ (Very weak - single fixed key) Best for: Quick obfuscation, forum spoilers, simple hiding\n\nAtbash Cipher (Reverse Alphabet)\n\nHow it works: Replace A with Z, B with Y, C with X, etc. (reverse alphabet)\n\nKey: None (fixed pattern)\n\nExample:\n\nPlaintext: HIDDEN\nCiphertext: SRWWVM\n\nH → S (A=Z, B=Y, ... H=S)\nI → R\nD → W\nD → W\nE → V\nN → M\n\n\nStrength: ⭐☆☆☆☆ (Very weak - no key variation) Best for: Quick reversal, simple codes\n\nPigpen Cipher (Symbol Substitution)\n\nHow it works: Replace letters with geometric symbols based on grids.\n\nKey: Grid arrangement (standard or custom)\n\nGrid Pattern:\n\n# Grid 1:        # Grid 2:\n    A|B|C           J|K|L\n   -+-+-           -+-+-\n    D|E|F           M|N|O\n   -+-+-           -+-+-\n    G|H|I           P|Q|R\n\n# X-Grid 1:     # X-Grid 2:\n   S   T            W   X\n     X              X\n   U   V            Y   Z\n\n\nExample:\n\nPlaintext: HELLO\nSymbols: [H][E][L][L][O]\n\nH = bottom-left of first grid\nE = middle of first grid\nL = top-right of second grid\nL = top-right of second grid\nO = middle of second grid\n\n\nStrength: ⭐⭐☆☆☆ (Weak - pattern recognition) Best for: Visual encoding, kids, scavenger hunts\n\n3. Intermediate Ciphers (Getting Stronger)\nPolybius Square (Grid Coordinates)\n\nHow it works: Letters arranged in 5×5 grid (I/J combined). Each letter = row + column.\n\nKey: Grid arrangement (can be scrambled)\n\nStandard Grid:\n\n  1 2 3 4 5\n1 A B C D E\n2 F G H I/J K\n3 L M N O P\n4 Q R S T U\n5 V W X Y Z\n\n\nExample:\n\nPlaintext: ATTACK\nCiphertext: 11 44 44 11 13 25\n\nA = row 1, col 1 = 11\nT = row 4, col 4 = 44\nT = row 4, col 4 = 44\nA = row 1, col 1 = 11\nC = row 1, col 3 = 13\nK = row 2, col 5 = 25\n\n\nStrength: ⭐⭐☆☆☆ (Weak alone, strong when combined) Best for: Numeric encoding, combining with other methods\n\nVigenère Cipher (Keyword-Based Shift)\n\nHow it works: Like Caesar but the shift changes for each letter based on a keyword.\n\nKey: Keyword or phrase (longer = stronger)\n\nExample:\n\nPlaintext: ATTACK AT DAWN\nKey:       SECRETSECRETSE\nCiphertext: SXVRGD SX HSAS\n\nA + S = S (0+18 mod 26)\nT + E = X (19+4 mod 26)\nT + C = V (19+2 mod 26)\nA + R = R (0+17 mod 26)\nC + E = G (2+4 mod 26)\nK + T = D (10+19 mod 26)\n...\n\n\nVigenère Square (for reference):\n\n    A B C D E F ...\nA | A B C D E F ...\nB | B C D E F G ...\nC | C D E F G H ...\n... (26×26 grid)\n\n\nDecoding: Use keyword to shift backward.\n\nStrength: ⭐⭐⭐☆☆ (Moderate - strong if long keyword) Best for: Keyword-based secrecy, shared phrase keys\n\nRail Fence Cipher (Transposition)\n\nHow it works: Write message in zigzag pattern across multiple rails, read off by rows.\n\nKey: Number of rails (2-10)\n\nExample with 3 rails:\n\nPlaintext: THISISASECRET\n\nWriting pattern (3 rails):\nT . . . S . . . E . . . T     Rail 1: T S E T\n. H . S . I . A . S . C . E   Rail 2: H S I A S C E\n. . I . . . S . . . R . .     Rail 3: I S R\n\nCiphertext: TSET HSIASECE ISR (read row by row)\nCompact: TSETHSIASCEEISR\n\n\nDecoding: Know number of rails, reverse the zigzag write.\n\nStrength: ⭐⭐☆☆☆ (Weak - pattern-based) Best for: Visual rearrangement, combining with substitution\n\n4. Advanced Ciphers (Modern Sophistication)\nPlayfair Cipher (Digraph Substitution)\n\nHow it works: Encrypt pairs of letters using a 5×5 keyed grid. Much stronger than single-letter substitution.\n\nKey: Keyword creates the grid\n\nGrid Creation:\n\nWrite keyword (remove duplicates)\nFill rest with unused alphabet letters\nCombine I/J\n\nExample with keyword \"MONARCHY\":\n\nM O N A R\nC H Y B D\nE F G I/J K\nL P Q S T\nU V W X Z\n\n\nEncryption Rules:\n\nIf both letters in same row: shift right\nIf both in same column: shift down\nIf forming rectangle: swap corners\n\nExample:\n\nPlaintext: HE LL OW OR LD (pairs)\nKey: MONARCHY\n\nHE: H=row2,col2 E=row3,col1 → Rectangle → EB\nLL: L=row4,col1 L=row4,col1 → Insert X: LX → LXLX\nOW: O=row1,col2 W=row5,col3 → Rectangle → AZ\nOR: O=row1,col2 R=row1,col5 → Same row → NA\nLD: L=row4,col1 D=row2,col5 → Rectangle → UD\n\nCiphertext: EB LZ OL AZ NA UD\n\n\nStrength: ⭐⭐⭐⭐☆ (Strong - resists frequency analysis) Best for: Serious encoding, resisting decryption\n\nColumnar Transposition (Keyword-Ordered)\n\nHow it works: Write message in rows, read columns in keyword-alphabetical order.\n\nKey: Keyword determines column order\n\nExample:\n\nPlaintext: ATTACK AT DAWN\nKey: ZEBRA (alphabetical: ABERZ = 52143)\n\nWrite in 5 columns under keyword:\nZ E B R A\n---------\nA T T A C\nK A T D A\nW N X X X (padding)\n\nRead columns in alphabetical order (A E B R Z):\nColumn A (5): C A X\nColumn E (2): T A N\nColumn B (3): T T X\nColumn R (4): A D X\nColumn Z (1): A K W\n\nCiphertext: CAXTANTТXADXAKW\nCompact: CAXTANTTXADXAKW\n\n\nStrength: ⭐⭐⭐☆☆ (Moderate - order is key) Best for: Scrambling message structure\n\nOne-Time Pad (Theoretically Unbreakable)\n\nHow it works: Each message encrypted with truly random key, used only once, same length as message.\n\nKey: Random string same length as plaintext (MUST be truly random, MUST be used only once)\n\nExample:\n\nPlaintext: HELLO\nKey:       XMCKL (truly random, never reused)\n\nH + X = E (7+23 mod 26)\nE + M = Q (4+12 mod 26)\nL + C = N (11+2 mod 26)\nL + K = V (11+10 mod 26)\nO + L = Z (14+11 mod 26)\n\nCiphertext: EQNVZ\n\n\nCRITICAL: Key must be:\n\nTruly random (not pseudo-random)\nSame length as message\nUsed only ONCE (hence \"one-time\")\nSecurely shared ahead of time\n\nStrength: ⭐⭐⭐⭐⭐ (Perfect if used correctly) Best for: Maximum security (if you can manage true randomness and single-use keys)\n\n5. Hybrid Ciphers (Layered Security)\nDouble Encryption (Two-Step Process)\n\nMethod: Apply two different ciphers sequentially\n\nExample: Vigenère + Rail Fence\n\nStep 1: Vigenère with keyword \"FORTRESS\"\nPlaintext: MEET ME AT THE BRIDGE\nKey: FORTRESSFORTRESSFO\nResult: RXJG ZR UG GUR VKWQTR\n\nStep 2: Rail Fence with 3 rails\nInput: RXJGZRUGGURVIIWQTR\nOutput: RJZGRTVR XGUGUKWT RI (rail-encoded)\n\nFinal Ciphertext: RJZGRTVХGUGUKWTГRI\n\n\nDecoding: Reverse order (Rail Fence first, then Vigenère)\n\nStrength: ⭐⭐⭐⭐☆ (Much stronger than either alone)\n\nPolybius + Vigenère\n\nMethod: Convert to numbers, then shift with keyword\n\nExample:\n\nStep 1: Polybius Square\nPlaintext: HELLO\nNumbers: 23 15 31 31 34\n\nStep 2: Vigenère on Numbers\nKey: SECRET = 18 14 12 17 14 19\nAdd key to numbers (mod 100):\n23+18=41, 15+14=29, 31+12=43, 31+17=48, 34+14=48\n\nFinal Ciphertext: 41 29 43 48 48\n\n\nStrength: ⭐⭐⭐⭐☆ (Numeric + alphabetic layers)\n\n6. Key Generation & Management\n\nThe most important part of cryptography: KEY MANAGEMENT\n\nKey Types\n\n1. Shift/Rotation Keys (Simple)\n\nNumber (1-25 for Caesar)\nDirection (forward/backward)\nExample: \"ROT13\", \"Shift +7\"\n\n2. Keyword Keys (Intermediate)\n\nWord or phrase\nLonger = stronger\nMemorable but not obvious\nExample: \"FORTRESS\", \"PURPLE ELEPHANT\"\n\n3. Random Keys (Advanced)\n\nTruly random characters\nOne-time use (OTP)\nMust be securely shared\nExample: \"XQPVHGKLMNZRT\"\n\n4. Grid/Pattern Keys (Visual)\n\nGrid arrangement (Polybius, Playfair)\nSymbol mapping (Pigpen variants)\nExample: \"Grid arranged by keyword MONARCH\"\nKey Sharing Methods (Manual)\n\nHow to share your key securely:\n\nIn-Person Exchange (Most secure)\n\nWhisper the key\nWrite on paper, watch them memorize, destroy paper\nUse pre-arranged code phrases\n\nSeparate Channel (Good)\n\nSend encrypted message via email\nSend key via text message (different platform)\nNever both on same channel\n\nPre-Arranged Keys (Best for ongoing)\n\nAgree on keyword/pattern before separation\nUse shared secret (inside joke, date, location)\nChange periodically\n\nPhysical Key Exchange (Creative)\n\nHide key in letter, send via mail\nEncode key using simpler cipher\nUse drop location for key card\n\nKey Security Rules:\n\n❌ Never send key with encrypted message on same channel\n❌ Never reuse one-time pad keys\n✅ Change keys regularly\n✅ Destroy old keys after use\n✅ Memorize when possible\n7. Practical Usage Examples\nExample 1: Secret Meeting Coordination\n\nScenario: You need to tell your friend where and when to meet, but you're communicating in a public group chat.\n\nSolution:\n\nCode Names:\n- You: \"Phoenix\"\n- Friend: \"Atlas\"\n- Meeting spot: \"Raven's Point\" (actually the north library entrance)\n- Time: Use Vigenère\n\nMessage Setup:\nPlaintext: MEET AT RAVENS POINT AT THREE PM\nCipher: Vigenère\nKey: FORTRESS (shared in-person last week)\n\nEncoding:\nM+F=R, E+O=S, E+R=V, T+T=M, ...\n\nEncrypted: RXJG UG KHEVLA UTVRM UG GLVJJ TZ\n\nSent Message:\n\"Phoenix to Atlas: RXJG UG KHEVLA UTVRM UG GLVJJ TZ\"\n\nFriend decodes using FORTRESS key → Meets you at Raven's Point (north library) at 3pm\n\nExample 2: Scavenger Hunt Clues\n\nScenario: Creating secret clues for a treasure hunt.\n\nSolution:\n\nClue 1 (Simple - Caesar Shift 5):\nPlaintext: LOOK UNDER THE OAK TREE\nCiphertext: QTTP ZSIJW YMJ TPF YWJJ\n\nClue 2 (Medium - Rail Fence 4 rails):\nPlaintext: THE TREASURE IS IN THE SHED\nCiphertext: TEUEIHHE RSRSNSDE TISHETDR\n\nClue 3 (Hard - Playfair with keyword HUNTER):\nPlaintext: FINAL PRIZE BEHIND DOOR TWO\n(Encrypted with Playfair)\nCiphertext: GHPBM QXFBH CHAKMB ENNX VVS\n\nEach clue progressively harder, keys provided when previous clue found.\n\nExample 3: Private Journal Entries\n\nScenario: You want to keep a journal that's private even if someone reads it.\n\nSolution:\n\nMethod: Double Vigenère (two different keywords)\n\nFirst Pass:\nPlaintext: TODAY I LEARNED SOMETHING IMPORTANT\nKey 1: JOURNAL\nCiphertext 1: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV\n\nSecond Pass:\nPlaintext: CLHDB R VWTCPWH DLZSEVTUP PPWCRVQEV\nKey 2: PRIVATE\nCiphertext 2: RVPCQ G KXIGXFT SGDTHSOTZ EIAXQVYOX\n\nFinal encrypted entry goes in journal.\nOnly you know both keys to decrypt.\n\nExample 4: Team Communication\n\nScenario: Remote team needs to share sensitive project info.\n\nSolution:\n\nCode Name System:\n- Project: \"Operation Silver Dawn\"\n- Team members: Phoenix, Atlas, Cipher, Raven\n- Milestones: Alpha, Bravo, Charlie, Delta\n\nSensitive Message Encoding:\nMethod: Columnar Transposition + Substitution\nKey: Team keyword \"SILVERDOWN\" (agreed in kickoff meeting)\n\nMessage:\n\"Phoenix reports Charlie milestone complete on schedule\"\n\nEncoded:\n\"PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN\"\n\nSent in Slack:\n\"SILVER: PXHNIR ETORCP HLEIM TSOEE NLTCP SEODH EUELN\"\n\nTeam members decode using shared key.\n\n8. Educational Cipher Challenges\nBeginner Challenges\n\nChallenge 1: Caesar Cipher\n\nEncrypted: WKLV LV D VHFUHW PHVVDJH\nHint: Shift is 3\nDecrypt it!\n\nAnswer: THIS IS A SECRET MESSAGE\n\n\nChallenge 2: Atbash\n\nEncrypted: HXVVGH HLFGS\nWhat does it say?\n\nAnswer: SUMMER NIGHT (H→S, X→C, etc.)\n\nIntermediate Challenges\n\nChallenge 3: Vigenère\n\nEncrypted: YXPKI HS ASWZE\nKeyword: LOCK\nDecrypt it!\n\nAnswer: OPENS AT SEVEN\n\n\nChallenge 4: Rail Fence (3 rails)\n\nEncrypted: TETYESCESGA HEEARMSE\nDecrypt it!\n\nAnswer: THE SECRET MESSAGE (written in zigzag)\n\nAdvanced Challenges\n\nChallenge 5: Playfair\n\nEncrypted: FD EO OA TP ED ND RP\nKeyword: EXAMPLE\nDecrypt it! (Remember digraph rules)\n\nAnswer: HIDDEN CHAMBER (requires Playfair decoding)\n\n9. Cipher Selection Guide\nWhen to Use Which Cipher\n\nQuick & Fun (Minutes):\n\nCaesar/ROT13: Casual messages, quick hiding\nAtbash: Simple reversal\nPigpen: Visual fun, scavenger hunts\n\nModerate Security (Hours to crack):\n\nVigenère: Keyword-based secrecy\nPolybius: Numeric encoding\nRail Fence: Pattern scrambling\n\nStrong Security (Days/weeks to crack):\n\nPlayfair: Digraph substitution\nColumnar Transposition: Keyword ordering\nDouble encryption: Layered methods\n\nMaximum Security (Theoretically unbreakable):\n\nOne-Time Pad: True randomness + single use\nONLY if you can ensure truly random keys and perfect key management\nCipher Comparison Matrix\nCipher\tStrength\tSpeed\tKey Type\tBest For\nCaesar\t⭐\tFast\tNumber\tKids, quick\nAtbash\t⭐\tFast\tNone\tReversal\nPigpen\t⭐⭐\tMedium\tPattern\tVisual\nVigenère\t⭐⭐⭐\tMedium\tKeyword\tShared secrets\nPolybius\t⭐⭐\tMedium\tGrid\tNumbers\nRail Fence\t⭐⭐\tMedium\tNumber\tScrambling\nPlayfair\t⭐⭐⭐⭐\tSlow\tKeyword\tStrong encryption\nOTP\t⭐⭐⭐⭐⭐\tMedium\tRandom\tMaximum security\nHybrid\t⭐⭐⭐⭐\tSlow\tMultiple\tLayered protection\n10. Important Security Notes\nWhat SecretCodex IS:\n\n✅ Educational cryptography tool ✅ Fun way to learn cipher techniques ✅ Practical for casual secret messages ✅ Great for games, puzzles, scavenger hunts ✅ Introduction to key management concepts\n\nWhat SecretCodex IS NOT:\n\n❌ Not a replacement for modern encryption (AES, RSA, etc.) ❌ Not suitable for truly sensitive data (use proper encryption software) ❌ Not protection against determined adversaries ❌ Not a substitute for secure communication platforms\n\nWhen to Use Proper Encryption:\nFinancial information\nPersonal identification data\nMedical records\nLegal documents\nBusiness secrets\nAnything truly confidential\n\nFor those use cases: Use AES-256, RSA, or encrypted messaging apps (Signal, WhatsApp, etc.)\n\nSecretCodex is for:\n\nLearning cryptography\nFun secret messages\nCasual privacy\nEducational purposes\nNostalgia and enjoyment\nWhen to Use This Skill\n\nUse SecretCodex when you want to:\n\nGenerate creative code names for operations/teams/locations\nEncode a secret message to a friend or family member\nDecode a message someone sent you (if you have the key)\nLearn how different ciphers work\nCreate puzzle challenges or scavenger hunts\nAdd mystery to games or role-playing\nPractice cryptographic thinking\nHave nostalgic decoder ring fun with modern sophistication\n\nRemember: The strength of encryption isn't just the algorithm—it's the key. Protect your keys, share them wisely, and change them often!\n\n🔐 \"In cryptography, we trust... but only with good key management!\" 🔐"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/akhmittra/secretcodex",
    "publisherUrl": "https://clawhub.ai/akhmittra/secretcodex",
    "owner": "akhmittra",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/secretcodex",
    "downloadUrl": "https://openagent3.xyz/downloads/secretcodex",
    "agentUrl": "https://openagent3.xyz/skills/secretcodex/agent",
    "manifestUrl": "https://openagent3.xyz/skills/secretcodex/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/secretcodex/agent.md"
  }
}