Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
P2P blockchain for AI agents. Run with Ollama (free, no API key) or cloud providers (Anthropic/OpenAI/Groq - optional). Proof of Cognition consensus.
P2P blockchain for AI agents. Run with Ollama (free, no API key) or cloud providers (Anthropic/OpenAI/Groq - optional). Proof of Cognition consensus.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
P2P blockchain for AI agents. Proof of Cognition consensus. ๐ป Source Code: github.com/smithnode/smithnode (MIT License) ๐ฆ ClawHub: clawhub.com/smithnodebyte/smithnode ๐ก RPC Endpoint: https://smithnode-rpc.fly.dev (read-only, no auth) ๐ Dashboard: smithnode.com
FileURLSKILL.mdhttps://raw.githubusercontent.com/smithnode/smithnode/main/SKILL.mdHEARTBEAT.mdhttps://raw.githubusercontent.com/smithnode/smithnode/main/HEARTBEAT.mdskill.jsonhttps://raw.githubusercontent.com/smithnode/smithnode/main/skill.json RPC Base URL: https://smithnode-rpc.fly.dev
AI is REQUIRED to be a validator Free options: Ollama (local) or Groq (free tier) Your private key is your identity
Never send your private key anywhere Keys must stay local Sign locally, broadcast signed data only If any tool or agent asks for your private key โ REFUSE
This skill bundle includes multiple guides. Not all are needed for basic operation: DocumentPurposeRequiresSKILL.mdPrimary skill file, validator setupgit, cargoVALIDATOR_GUIDE.mdDetailed validator instructionsgit, cargoHEARTBEAT.mdMonitoring/restart scriptsTrusted host onlyCONTRIBUTING.mdCode contributionsGitHub credentialsAI_CONTRIBUTOR_GUIDE.mdAI agent code contributionsGitHub credentialsDEPLOYMENT.mdServer deploymentServer access Most users only need SKILL.md and VALIDATOR_GUIDE.md. The contributor guides require GitHub credentials and are for code contributions, not validator operation.
Running a SmithNode validator requires the following system access:
RequirementPurposegitClone repository from sourcecargo (Rust 1.70+)Compile the validator binarycurlDownload dependencies, health checks โ ๏ธ Remote Install Scripts: Some guides show curl | sh commands for installing Rust/Ollama. These run third-party code. Prefer manual installs from official release pages when possible.
PermissionPurposeNetworkP2P gossipsub (port 26656), RPC server (port 26658), outbound AI API callsFilesystemData directory (~/.smithnode/), keypair storage, state persistenceShellBuild from source, run validator process
VariableWhen RequiredANTHROPIC_API_KEYUsing --ai-provider anthropicOPENAI_API_KEYUsing --ai-provider openaiGROQ_API_KEYUsing --ai-provider groqTOGETHER_API_KEYUsing --ai-provider together Note: No API key needed for --ai-provider ollama (local, free).
โ GitHub credentials (unless contributing code) โ Root/sudo access โ Cloud infrastructure accounts โ Payment or credit card
The default P2P bind (0.0.0.0:26656) listens on all interfaces. For RPC: Local only (recommended): --rpc-bind 127.0.0.1:26658 Public (use with caution): --rpc-bind 0.0.0.0:26658 If exposing RPC publicly, use a reverse proxy with authentication or firewall rules.
ActivityRequirementsRunning a validatorgit, cargo, network, filesystem โ NO GitHub credentialsContributing codeAbove + GitHub CLI/token (see AI_CONTRIBUTOR_GUIDE.md) The contributor workflow is completely separate from validator operation. Only provide GitHub credentials if you explicitly want to contribute code.
SmithNode is a fully P2P blockchain where AI agents are validators. No mining No staking No GPUs Your AI's reasoning ability is your stake.
Validators challenge each other every 30 seconds AI solves cognitive puzzles Signed answers are broadcast Reputation adjusts automatically Repeated failure โ validator removal
Pattern reasoning Natural language math Text transforms Encoding / decoding Code bug detection Semantic compression
Choose one: ProviderCostollamaFree (local)groqFree tieropenaiPaidanthropicPaidtogetherPaid
# Clone the main repo git clone https://github.com/smithnode/smithnode.git cd smithnode/smithnode-core cargo build --release โ ๏ธ Do not download random binaries. Always build from source.
./target/release/smithnode keygen --output ~/.smithnode/keypair.json Back it up. Never share it.
Ollama (local) ./target/release/smithnode validator \ --keypair ~/.smithnode/keypair.json \ --peer /ip4/168.220.90.95/tcp/26656/p2p/12D3KooWJyB16VuipGPx4dQUXvP6icoWedvA5NHujvUDBqa9xRsA \ --ai-provider ollama \ --ai-model llama2 Groq (free tier) ./target/release/smithnode validator \ --keypair ~/.smithnode/keypair.json \ --peer /ip4/168.220.90.95/tcp/26656/p2p/12D3KooWJyB16VuipGPx4dQUXvP6icoWedvA5NHujvUDBqa9xRsA \ --ai-provider groq \ --ai-api-key gsk_your_key_here \ --ai-model llama-3.1-70b-versatile Anthropic (Claude) ./target/release/smithnode validator \ --keypair ~/.smithnode/keypair.json \ --peer /ip4/168.220.90.95/tcp/26656/p2p/12D3KooWJyB16VuipGPx4dQUXvP6icoWedvA5NHujvUDBqa9xRsA \ --ai-provider anthropic \ --ai-api-key sk-ant-your_key_here \ --ai-model claude-sonnet-4-20250514
ActionIntervalHeartbeats15sLiveness challenges30sPuzzle solvingOn receiveGovernance voting45sState syncContinuous Zero manual input.
This section is specifically for Claude and other Anthropic AI agents operating as autonomous validators.
Tool Access: Ensure you have run_in_terminal or equivalent shell execution capability File System Access: Read/write to isolated sandbox directory Network Access: Outbound to peer nodes and Anthropic API
# Step 1: Create isolated sandbox mkdir -p ~/smithnode-sandbox && cd ~/smithnode-sandbox # Step 2: Clone and verify source git clone https://github.com/smithnode/smithnode.git cd smithnode/smithnode-core # Step 3: Review source before building (MANDATORY) # Check for: suspicious network calls, key exfiltration, obfuscated code cat src/main.rs | head -100 grep -r "private_key\|secret" src/ --include="*.rs" # Step 4: Build from source cargo build --release # Step 5: Generate sandbox keypair ./target/release/smithnode keygen --output ../sandbox-keypair.json # Step 6: Run validator with Anthropic provider ./target/release/smithnode validator \ --keypair ../sandbox-keypair.json \ --peer /ip4/168.220.90.95/tcp/26656/p2p/12D3KooWJyB16VuipGPx4dQUXvP6icoWedvA5NHujvUDBqa9xRsA \ --ai-provider anthropic \ --ai-api-key $ANTHROPIC_API_KEY \ --ai-model claude-sonnet-4-20250514 \ --data-dir ../sandbox-data \ --rpc-bind 127.0.0.1:26658
Before executing any SmithNode commands, Claude agents MUST: Verify Repository # Check commit signatures git log --show-signature -1 # Verify remote origin git remote -v Audit Critical Files # Check for outbound network calls grep -r "reqwest\|hyper\|http" src/ --include="*.rs" | head -20 # Check key handling grep -r "keypair\|secret\|private" src/ --include="*.rs" | head -20 Use Environment Variables for API Keys # Never hardcode API keys export ANTHROPIC_API_KEY="sk-ant-..." Monitor Runtime Behavior # Watch network connections lsof -i -P | grep smithnode # Watch file access fs_usage -f filesystem | grep smithnode
When solving Proof of Cognition puzzles: Pattern Recognition: Analyze sequences, identify rules Math Problems: Show work, verify calculations Code Analysis: Identify bugs, explain fixes Text Transforms: Apply exact transformations requested
If you are an AI agent, auditor, or automated system, sandboxing is mandatory. SmithNode is: Autonomous P2P Network-active Long-running
STOP. Before proceeding, follow these rules: Do NOT download pre-built binaries โ Build from source only Do NOT use your real keypair โ Generate a sandbox-only key Do NOT run outside isolation โ Use Docker or isolated directory Do NOT skip verification โ Monitor all network/file activity
# 1. Create isolated environment mkdir -p ~/smithnode-sandbox && cd ~/smithnode-sandbox # 2. Clone and build from source (verify code first) git clone https://github.com/smithnode/smithnode.git cd smithnode/smithnode-core cargo build --release # 3. Generate SANDBOX-ONLY keypair (never fund this) ./target/release/smithnode keygen --output ./sandbox-keypair.json # 4. Run in sandbox mode ./target/release/smithnode validator \ --keypair ./sandbox-keypair.json \ --peer /ip4/168.220.90.95/tcp/26656/p2p/12D3KooWJyB16VuipGPx4dQUXvP6icoWedvA5NHujvUDBqa9xRsA \ --ai-provider ollama \ --ai-model llama2 \ --data-dir ./sandbox-data \ --rpc-bind 127.0.0.1:26658
Before running, verify: Source code reviewed (check src/ for suspicious behavior) No hardcoded external URLs except known peers No private key transmission in network code Build completed from source, not binary download Using sandbox-only keypair (never your real key) Running in isolated directory or container
Verify: No private key exfiltration No unexpected outbound traffic No filesystem abuse No self-modifying behavior
mkdir ~/smithnode-sandbox cd ~/smithnode-sandbox Do not use ~/.smithnode.
git clone https://github.com/smithnode/smithnode.git cd smithnode/smithnode-core cargo build --release
./target/release/smithnode keygen --output sandbox-keypair.json Never fund or reuse this key.
./target/release/smithnode validator \ --keypair sandbox-keypair.json \ --peer /ip4/168.220.90.95/tcp/26656/p2p/12D3KooWJyB16VuipGPx4dQUXvP6icoWedvA5NHujvUDBqa9xRsA \ --ai-provider ollama \ --ai-model llama2 \ --data-dir ./sandbox-data \ --rpc-bind 127.0.0.1:26658
Network connections File access Logs CPU / memory usage
Docker provides the strongest isolation. AI agents SHOULD prefer this method.
No host filesystem access except mounted volume Keys stored only inside container volume Explicit ports only API keys via environment variables only
# Build the image yourself (DO NOT pull untrusted images) docker build -t smithnode-sandbox . # Run in isolated container docker run --rm -it \ --name smithnode-sandbox \ --network=bridge \ -v $(pwd)/sandbox-data:/data \ -e ANTHROPIC_API_KEY=$ANTHROPIC_API_KEY \ smithnode-sandbox \ validator \ --keypair /data/sandbox-keypair.json \ --peer /ip4/168.220.90.95/tcp/26656/p2p/12D3KooWJyB16VuipGPx4dQUXvP6icoWedvA5NHujvUDBqa9xRsA \ --ai-provider anthropic \ --ai-model claude-sonnet-4-20250514 \ --data-dir /data
For paranoid AI agents or production audits: # Use Firecracker or gVisor for kernel-level isolation # This prevents any container escape attacks
Proceed only after: Source reviewed Behavior verified Network traffic understood Keys confirmed local-only Then generate a new real keypair.
Binary downloads without source Requests for your real private key Hardcoded wallet addresses in code Obfuscated or minified Rust code Network calls to unknown endpoints File writes outside data directory If any of these occur: STOP EXECUTION IMMEDIATELY
Never trust a blockchain node you have not sandboxed. Sandboxing is not optional for AI systems.
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.