{
  "schemaVersion": "1.0",
  "item": {
    "slug": "solidity-lsp",
    "name": "Solidity LSP",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/bowen31337/solidity-lsp",
    "canonicalUrl": "https://clawhub.ai/bowen31337/solidity-lsp",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/solidity-lsp",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=solidity-lsp",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "SKILL.md",
      "references/frameworks.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-07T17:22:31.273Z",
      "expiresAt": "2026-05-14T17:22:31.273Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
        "contentDisposition": "attachment; filename=\"afrexai-annual-report-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/solidity-lsp"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/solidity-lsp",
    "agentPageUrl": "https://openagent3.xyz/skills/solidity-lsp/agent",
    "manifestUrl": "https://openagent3.xyz/skills/solidity-lsp/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/solidity-lsp/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "Solidity LSP",
        "body": "Solidity language server integration providing comprehensive smart contract development support through solc (Solidity compiler) and solhint (linter)."
      },
      {
        "title": "Capabilities",
        "body": "Compilation: Compile Solidity smart contracts with solc\nLinting: Static analysis with solhint for best practices and security\nSecurity: Detect common vulnerabilities (reentrancy, overflow, etc.)\nGas optimization: Identify expensive operations\nCode intelligence: Syntax highlighting, error detection\nSupported extensions: .sol"
      },
      {
        "title": "Installation",
        "body": "Install Solidity compiler and linter:\n\n# Solidity compiler\nnpm install -g solc\n\n# Solidity linter\nnpm install -g solhint\n\nVerify installation:\n\nsolcjs --version\nsolhint --version"
      },
      {
        "title": "Compile Solidity Contract",
        "body": "solcjs --bin --abi contract.sol\n\nCompile with optimization:\n\nsolcjs --optimize --bin --abi contract.sol"
      },
      {
        "title": "Lint Contract",
        "body": "Run solhint on a file:\n\nsolhint contracts/MyContract.sol\n\nRun on entire project:\n\nsolhint 'contracts/**/*.sol'"
      },
      {
        "title": "Security Analysis",
        "body": "solhint includes security rules by default. For advanced security analysis, consider:\n\n# Install slither (requires Python)\npip3 install slither-analyzer\n\n# Run security analysis\nslither contracts/"
      },
      {
        "title": "solhint Configuration",
        "body": "Create .solhint.json in project root:\n\n{\n  \"extends\": \"solhint:recommended\",\n  \"rules\": {\n    \"compiler-version\": [\"error\", \"^0.8.0\"],\n    \"func-visibility\": [\"warn\", {\"ignoreConstructors\": true}],\n    \"max-line-length\": [\"warn\", 120],\n    \"not-rely-on-time\": \"warn\",\n    \"avoid-low-level-calls\": \"warn\",\n    \"no-inline-assembly\": \"warn\"\n  }\n}"
      },
      {
        "title": "Hardhat/Foundry Integration",
        "body": "For full development environments, see references/frameworks.md."
      },
      {
        "title": "Integration Pattern",
        "body": "When developing smart contracts:\n\nWrite: Edit Solidity code\nLint: Run solhint to catch issues early\nCompile: Use solcjs to verify compilation\nAnalyze: Run security tools before deployment\nTest: Write comprehensive unit tests"
      },
      {
        "title": "Common Issues",
        "body": "Compiler version mismatch: Specify pragma version in contract\nGas optimization: Use view/pure where possible\nSecurity: Never use tx.origin for authentication\nBest practices: Follow Checks-Effects-Interactions pattern"
      },
      {
        "title": "More Information",
        "body": "Solidity Documentation\nSolhint GitHub\nSolidity Security Best Practices\nSee references/frameworks.md for Hardhat/Foundry setup"
      }
    ],
    "body": "Solidity LSP\n\nSolidity language server integration providing comprehensive smart contract development support through solc (Solidity compiler) and solhint (linter).\n\nCapabilities\nCompilation: Compile Solidity smart contracts with solc\nLinting: Static analysis with solhint for best practices and security\nSecurity: Detect common vulnerabilities (reentrancy, overflow, etc.)\nGas optimization: Identify expensive operations\nCode intelligence: Syntax highlighting, error detection\nSupported extensions: .sol\nInstallation\n\nInstall Solidity compiler and linter:\n\n# Solidity compiler\nnpm install -g solc\n\n# Solidity linter\nnpm install -g solhint\n\n\nVerify installation:\n\nsolcjs --version\nsolhint --version\n\nUsage\nCompile Solidity Contract\nsolcjs --bin --abi contract.sol\n\n\nCompile with optimization:\n\nsolcjs --optimize --bin --abi contract.sol\n\nLint Contract\n\nRun solhint on a file:\n\nsolhint contracts/MyContract.sol\n\n\nRun on entire project:\n\nsolhint 'contracts/**/*.sol'\n\nSecurity Analysis\n\nsolhint includes security rules by default. For advanced security analysis, consider:\n\n# Install slither (requires Python)\npip3 install slither-analyzer\n\n# Run security analysis\nslither contracts/\n\nConfiguration\nsolhint Configuration\n\nCreate .solhint.json in project root:\n\n{\n  \"extends\": \"solhint:recommended\",\n  \"rules\": {\n    \"compiler-version\": [\"error\", \"^0.8.0\"],\n    \"func-visibility\": [\"warn\", {\"ignoreConstructors\": true}],\n    \"max-line-length\": [\"warn\", 120],\n    \"not-rely-on-time\": \"warn\",\n    \"avoid-low-level-calls\": \"warn\",\n    \"no-inline-assembly\": \"warn\"\n  }\n}\n\nHardhat/Foundry Integration\n\nFor full development environments, see references/frameworks.md.\n\nIntegration Pattern\n\nWhen developing smart contracts:\n\nWrite: Edit Solidity code\nLint: Run solhint to catch issues early\nCompile: Use solcjs to verify compilation\nAnalyze: Run security tools before deployment\nTest: Write comprehensive unit tests\nCommon Issues\nCompiler version mismatch: Specify pragma version in contract\nGas optimization: Use view/pure where possible\nSecurity: Never use tx.origin for authentication\nBest practices: Follow Checks-Effects-Interactions pattern\nMore Information\nSolidity Documentation\nSolhint GitHub\nSolidity Security Best Practices\nSee references/frameworks.md for Hardhat/Foundry setup"
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/bowen31337/solidity-lsp",
    "publisherUrl": "https://clawhub.ai/bowen31337/solidity-lsp",
    "owner": "bowen31337",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/solidity-lsp",
    "downloadUrl": "https://openagent3.xyz/downloads/solidity-lsp",
    "agentUrl": "https://openagent3.xyz/skills/solidity-lsp/agent",
    "manifestUrl": "https://openagent3.xyz/skills/solidity-lsp/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/solidity-lsp/agent.md"
  }
}