{
  "schemaVersion": "1.0",
  "item": {
    "slug": "shieldapi",
    "name": "ShieldAPI Security Intelligence",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/alberthild/shieldapi",
    "canonicalUrl": "https://clawhub.ai/alberthild/shieldapi",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/shieldapi",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=shieldapi",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "slug": "shieldapi",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-08T19:12:28.046Z",
      "expiresAt": "2026-05-15T19:12:28.046Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=shieldapi",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=shieldapi",
        "contentDisposition": "attachment; filename=\"shieldapi-3.0.3.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "shieldapi"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/shieldapi"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/shieldapi",
    "agentPageUrl": "https://openagent3.xyz/skills/shieldapi/agent",
    "manifestUrl": "https://openagent3.xyz/skills/shieldapi/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/shieldapi/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "🛡️ ShieldAPI — Security Intelligence for AI Agents",
        "body": "ShieldAPI is a pay-per-request Security Intelligence Service built on the x402 protocol (HTTP 402 Payment Required). It lets any AI agent perform comprehensive security checks — without accounts, API keys, or subscriptions. Just call, pay, get results.\n\nPayments are settled in USDC on Base Sepolia. All endpoints support free demo mode.\n\nBase URL: https://shield.vainplex.dev/api\n\nHealth/Discovery: GET /api/health (free, lists all endpoints + prices)"
      },
      {
        "title": "1. check-password — Password Breach Check",
        "body": "Checks a full SHA1 hash against 900M+ leaked passwords (HIBP Pwned Passwords).\n\nCost: 0.001 USDC\nRequest: GET /api/check-password?hash=<40-char-sha1>\nReturns: { found: true/false, count: 3861493 }"
      },
      {
        "title": "2. check-password-range — k-Anonymity Range Lookup",
        "body": "Returns all matching hash suffixes for a 5-char prefix (privacy-preserving).\n\nCost: 0.001 USDC\nRequest: GET /api/check-password-range?prefix=<5-char-sha1-prefix>\nReturns: { prefix, total_matches, results: [{ suffix, count }] }"
      },
      {
        "title": "3. check-domain — Domain Reputation",
        "body": "Checks DNS records, SPF/DMARC, SSL certificate, and queries Spamhaus/SpamCop/SORBS blacklists.\n\nCost: 0.003 USDC\nRequest: GET /api/check-domain?domain=<domain>\nReturns: { domain, dns, blacklists, ssl, risk_score, risk_level }"
      },
      {
        "title": "4. check-ip — IP Reputation",
        "body": "Checks IPv4 against 4 blacklists, detects Tor exit nodes, resolves reverse DNS.\n\nCost: 0.002 USDC\nRequest: GET /api/check-ip?ip=<ipv4>\nReturns: { ip, blacklists, is_tor_exit, reverse_dns, risk_score, risk_level }"
      },
      {
        "title": "5. check-email — Email Breach Exposure",
        "body": "Checks which data breaches affected the email's domain. Returns breach details, exposed data types, and risk recommendations.\n\nCost: 0.005 USDC\nRequest: GET /api/check-email?email=<email>\nReturns: { breaches: [...], domain_breach_count, risk_score, risk_level, recommendations }\nExample: test@linkedin.com → 3 breaches (2012: 164M accounts, 2021 scrape: 125M, 2023 scrape: 19M)"
      },
      {
        "title": "6. check-url — URL Safety & Phishing Detection",
        "body": "Checks URL against URLhaus malware database, runs heuristic analysis (brand impersonation, suspicious TLDs, redirect chains), and probes HTTP.\n\nCost: 0.003 USDC\nRequest: GET /api/check-url?url=<url>\nReturns: { url, checks: { urlhaus, heuristics, http }, threats, risk_score, risk_level }\nDetects: Malware distribution, brand impersonation (PayPal, Google, etc.), suspicious TLDs (.tk, .ml), excessive subdomains, login path keywords"
      },
      {
        "title": "7. full-scan — Combined Security Scan",
        "body": "Runs all applicable checks in parallel. Pass any combination of inputs.\n\nCost: 0.01 USDC\nRequest: GET /api/full-scan?email=<email>&password_hash=<sha1>&domain=<domain>&ip=<ip>&url=<url>\nReturns: Combined results with overall risk score and human-readable summary\nExample: ?email=test@linkedin.com&password_hash=5BAA61... → \"⚠️ Password found in 52M breaches, ⚠️ Domain affected by 3 breaches\""
      },
      {
        "title": "Demo Mode",
        "body": "All 7 endpoints support ?demo=true — returns realistic fake data, no payment required. Perfect for testing your integration before going live.\n\n# Try it now:\ncurl -s \"https://shield.vainplex.dev/api/check-url?demo=true\"\ncurl -s \"https://shield.vainplex.dev/api/full-scan?demo=true\"\ncurl -s \"https://shield.vainplex.dev/api/check-email?demo=true\""
      },
      {
        "title": "x402 Payment Flow",
        "body": "When you call any paid endpoint without payment, ShieldAPI returns HTTP 402 with machine-readable payment instructions:\n\n{\n  \"x402Version\": 1,\n  \"error\": \"X-PAYMENT header is required\",\n  \"accepts\": [{\n    \"scheme\": \"exact\",\n    \"network\": \"base-sepolia\",\n    \"maxAmountRequired\": \"3000\",\n    \"asset\": \"0x036CbD53842c5426634e7929541eC2318f3dCF7e\",\n    \"payTo\": \"0x...\",\n    \"resource\": \"https://shield.vainplex.dev/api/check-domain?domain=example.com\",\n    \"description\": \"Domain reputation & security check\"\n  }]\n}\n\nAn x402-enabled client (using @coinbase/x402, @x402/core, or any x402 library) will:\n\nRead the 402 response\nSign a USDC payment on Base Sepolia\nRetry with X-PAYMENT header\nReceive the security check results"
      },
      {
        "title": "Use Cases",
        "body": "Password rotation agents — Check if proposed passwords are in breach databases before setting them\nEmail onboarding — Verify new user emails aren't from heavily breached domains\nURL safety gates — Screen links before agents click or users visit them\nIP allowlisting — Verify IPs aren't Tor exits, proxies, or blacklisted\nSecurity audits — Full-scan an organization's domain, IPs, and common passwords in one call"
      },
      {
        "title": "Source & Links",
        "body": "Live API: https://shield.vainplex.dev/api/health\nSource: https://github.com/alberthild/shieldapi (coming soon)\nProtocol: https://x402.org\nData: HIBP (CC-BY), PhishTank, URLhaus (abuse.ch), Spamhaus"
      }
    ],
    "body": "🛡️ ShieldAPI — Security Intelligence for AI Agents\n\nShieldAPI is a pay-per-request Security Intelligence Service built on the x402 protocol (HTTP 402 Payment Required). It lets any AI agent perform comprehensive security checks — without accounts, API keys, or subscriptions. Just call, pay, get results.\n\nPayments are settled in USDC on Base Sepolia. All endpoints support free demo mode.\n\nBase URL: https://shield.vainplex.dev/api\n\nHealth/Discovery: GET /api/health (free, lists all endpoints + prices)\n\nEndpoints\n1. check-password — Password Breach Check\n\nChecks a full SHA1 hash against 900M+ leaked passwords (HIBP Pwned Passwords).\n\nCost: 0.001 USDC\nRequest: GET /api/check-password?hash=<40-char-sha1>\nReturns: { found: true/false, count: 3861493 }\n2. check-password-range — k-Anonymity Range Lookup\n\nReturns all matching hash suffixes for a 5-char prefix (privacy-preserving).\n\nCost: 0.001 USDC\nRequest: GET /api/check-password-range?prefix=<5-char-sha1-prefix>\nReturns: { prefix, total_matches, results: [{ suffix, count }] }\n3. check-domain — Domain Reputation\n\nChecks DNS records, SPF/DMARC, SSL certificate, and queries Spamhaus/SpamCop/SORBS blacklists.\n\nCost: 0.003 USDC\nRequest: GET /api/check-domain?domain=<domain>\nReturns: { domain, dns, blacklists, ssl, risk_score, risk_level }\n4. check-ip — IP Reputation\n\nChecks IPv4 against 4 blacklists, detects Tor exit nodes, resolves reverse DNS.\n\nCost: 0.002 USDC\nRequest: GET /api/check-ip?ip=<ipv4>\nReturns: { ip, blacklists, is_tor_exit, reverse_dns, risk_score, risk_level }\n5. check-email — Email Breach Exposure\n\nChecks which data breaches affected the email's domain. Returns breach details, exposed data types, and risk recommendations.\n\nCost: 0.005 USDC\nRequest: GET /api/check-email?email=<email>\nReturns: { breaches: [...], domain_breach_count, risk_score, risk_level, recommendations }\nExample: test@linkedin.com → 3 breaches (2012: 164M accounts, 2021 scrape: 125M, 2023 scrape: 19M)\n6. check-url — URL Safety & Phishing Detection\n\nChecks URL against URLhaus malware database, runs heuristic analysis (brand impersonation, suspicious TLDs, redirect chains), and probes HTTP.\n\nCost: 0.003 USDC\nRequest: GET /api/check-url?url=<url>\nReturns: { url, checks: { urlhaus, heuristics, http }, threats, risk_score, risk_level }\nDetects: Malware distribution, brand impersonation (PayPal, Google, etc.), suspicious TLDs (.tk, .ml), excessive subdomains, login path keywords\n7. full-scan — Combined Security Scan\n\nRuns all applicable checks in parallel. Pass any combination of inputs.\n\nCost: 0.01 USDC\nRequest: GET /api/full-scan?email=<email>&password_hash=<sha1>&domain=<domain>&ip=<ip>&url=<url>\nReturns: Combined results with overall risk score and human-readable summary\nExample: ?email=test@linkedin.com&password_hash=5BAA61... → \"⚠️ Password found in 52M breaches, ⚠️ Domain affected by 3 breaches\"\nDemo Mode\n\nAll 7 endpoints support ?demo=true — returns realistic fake data, no payment required. Perfect for testing your integration before going live.\n\n# Try it now:\ncurl -s \"https://shield.vainplex.dev/api/check-url?demo=true\"\ncurl -s \"https://shield.vainplex.dev/api/full-scan?demo=true\"\ncurl -s \"https://shield.vainplex.dev/api/check-email?demo=true\"\n\nx402 Payment Flow\n\nWhen you call any paid endpoint without payment, ShieldAPI returns HTTP 402 with machine-readable payment instructions:\n\n{\n  \"x402Version\": 1,\n  \"error\": \"X-PAYMENT header is required\",\n  \"accepts\": [{\n    \"scheme\": \"exact\",\n    \"network\": \"base-sepolia\",\n    \"maxAmountRequired\": \"3000\",\n    \"asset\": \"0x036CbD53842c5426634e7929541eC2318f3dCF7e\",\n    \"payTo\": \"0x...\",\n    \"resource\": \"https://shield.vainplex.dev/api/check-domain?domain=example.com\",\n    \"description\": \"Domain reputation & security check\"\n  }]\n}\n\n\nAn x402-enabled client (using @coinbase/x402, @x402/core, or any x402 library) will:\n\nRead the 402 response\nSign a USDC payment on Base Sepolia\nRetry with X-PAYMENT header\nReceive the security check results\nUse Cases\nPassword rotation agents — Check if proposed passwords are in breach databases before setting them\nEmail onboarding — Verify new user emails aren't from heavily breached domains\nURL safety gates — Screen links before agents click or users visit them\nIP allowlisting — Verify IPs aren't Tor exits, proxies, or blacklisted\nSecurity audits — Full-scan an organization's domain, IPs, and common passwords in one call\nSource & Links\nLive API: https://shield.vainplex.dev/api/health\nSource: https://github.com/alberthild/shieldapi (coming soon)\nProtocol: https://x402.org\nData: HIBP (CC-BY), PhishTank, URLhaus (abuse.ch), Spamhaus"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/alberthild/shieldapi",
    "publisherUrl": "https://clawhub.ai/alberthild/shieldapi",
    "owner": "alberthild",
    "version": "0.2.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/shieldapi",
    "downloadUrl": "https://openagent3.xyz/downloads/shieldapi",
    "agentUrl": "https://openagent3.xyz/skills/shieldapi/agent",
    "manifestUrl": "https://openagent3.xyz/skills/shieldapi/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/shieldapi/agent.md"
  }
}