Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
ShieldAPI — x402 Security Intelligence for AI Agents. 7 endpoints: password breach check (900M+ HIBP hashes), email breach lookup, domain reputation (DNS/bla...
ShieldAPI — x402 Security Intelligence for AI Agents. 7 endpoints: password breach check (900M+ HIBP hashes), email breach lookup, domain reputation (DNS/bla...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
ShieldAPI is a pay-per-request Security Intelligence Service built on the x402 protocol (HTTP 402 Payment Required). It lets any AI agent perform comprehensive security checks — without accounts, API keys, or subscriptions. Just call, pay, get results. Payments are settled in USDC on Base Sepolia. All endpoints support free demo mode. Base URL: https://shield.vainplex.dev/api Health/Discovery: GET /api/health (free, lists all endpoints + prices)
Checks a full SHA1 hash against 900M+ leaked passwords (HIBP Pwned Passwords). Cost: 0.001 USDC Request: GET /api/check-password?hash=<40-char-sha1> Returns: { found: true/false, count: 3861493 }
Returns all matching hash suffixes for a 5-char prefix (privacy-preserving). Cost: 0.001 USDC Request: GET /api/check-password-range?prefix=<5-char-sha1-prefix> Returns: { prefix, total_matches, results: [{ suffix, count }] }
Checks DNS records, SPF/DMARC, SSL certificate, and queries Spamhaus/SpamCop/SORBS blacklists. Cost: 0.003 USDC Request: GET /api/check-domain?domain=<domain> Returns: { domain, dns, blacklists, ssl, risk_score, risk_level }
Checks IPv4 against 4 blacklists, detects Tor exit nodes, resolves reverse DNS. Cost: 0.002 USDC Request: GET /api/check-ip?ip=<ipv4> Returns: { ip, blacklists, is_tor_exit, reverse_dns, risk_score, risk_level }
Checks which data breaches affected the email's domain. Returns breach details, exposed data types, and risk recommendations. Cost: 0.005 USDC Request: GET /api/check-email?email=<email> Returns: { breaches: [...], domain_breach_count, risk_score, risk_level, recommendations } Example: test@linkedin.com → 3 breaches (2012: 164M accounts, 2021 scrape: 125M, 2023 scrape: 19M)
Checks URL against URLhaus malware database, runs heuristic analysis (brand impersonation, suspicious TLDs, redirect chains), and probes HTTP. Cost: 0.003 USDC Request: GET /api/check-url?url=<url> Returns: { url, checks: { urlhaus, heuristics, http }, threats, risk_score, risk_level } Detects: Malware distribution, brand impersonation (PayPal, Google, etc.), suspicious TLDs (.tk, .ml), excessive subdomains, login path keywords
Runs all applicable checks in parallel. Pass any combination of inputs. Cost: 0.01 USDC Request: GET /api/full-scan?email=<email>&password_hash=<sha1>&domain=<domain>&ip=<ip>&url=<url> Returns: Combined results with overall risk score and human-readable summary Example: ?email=test@linkedin.com&password_hash=5BAA61... → "⚠️ Password found in 52M breaches, ⚠️ Domain affected by 3 breaches"
All 7 endpoints support ?demo=true — returns realistic fake data, no payment required. Perfect for testing your integration before going live. # Try it now: curl -s "https://shield.vainplex.dev/api/check-url?demo=true" curl -s "https://shield.vainplex.dev/api/full-scan?demo=true" curl -s "https://shield.vainplex.dev/api/check-email?demo=true"
When you call any paid endpoint without payment, ShieldAPI returns HTTP 402 with machine-readable payment instructions: { "x402Version": 1, "error": "X-PAYMENT header is required", "accepts": [{ "scheme": "exact", "network": "base-sepolia", "maxAmountRequired": "3000", "asset": "0x036CbD53842c5426634e7929541eC2318f3dCF7e", "payTo": "0x...", "resource": "https://shield.vainplex.dev/api/check-domain?domain=example.com", "description": "Domain reputation & security check" }] } An x402-enabled client (using @coinbase/x402, @x402/core, or any x402 library) will: Read the 402 response Sign a USDC payment on Base Sepolia Retry with X-PAYMENT header Receive the security check results
Password rotation agents — Check if proposed passwords are in breach databases before setting them Email onboarding — Verify new user emails aren't from heavily breached domains URL safety gates — Screen links before agents click or users visit them IP allowlisting — Verify IPs aren't Tor exits, proxies, or blacklisted Security audits — Full-scan an organization's domain, IPs, and common passwords in one call
Live API: https://shield.vainplex.dev/api/health Source: https://github.com/alberthild/shieldapi (coming soon) Protocol: https://x402.org Data: HIBP (CC-BY), PhishTank, URLhaus (abuse.ch), Spamhaus
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.