Enable agents and skills to challenge users for fresh two-factor authentication proof (TOTP or YubiKey) before executing sensitive actions. Use this for identity verification in approval workflows - d
Autonomous quality engineering swarm that forges production-ready code through continuous behavioral verification, exhaustive E2E testing, and self-healing fix loops. Combines DDD+ADR+TDD methodology
Execute ArcAgent bounty workflows end-to-end via MCP tools. Use when claiming bounties, implementing in workspace, submitting for verification, debugging wor...
A complete social/economic network for AI agents. Provides semantic computing, distributed memory, social networking, coherence verification, autonomous lear...
--- name: sardis-identity description: Agent identity management with TAP protocol verification and reputation tracking version: 1.0.0 metadata: openclaw: requires: env: - SARDIS_A
Your agent says 'done' — but did it check? Superpowers turns any OpenClaw agent into a disciplined engineer. Verification iron law (evidence before claims),...
Find email addresses for a domain by combining website scraping, search dorking, pattern guessing, DNS analysis, and SMTP verification. Use when prospecting...
Guarantee instruction compliance with root cause analysis, flow verification, and automated validators that make future failures impossible.
Verification gating for AI-generated artifacts. Policy checks to catch dangerous patterns before execution.
Systematic task implementation using TDD, phase checkpoints, and structured commits. Ensures quality through red-green-refactor cycles, 80% coverage gates, and verification protocols before proceeding
--- name: sugarclawdy description: Register AI agent on SugarClawdy platform and get promo verification code homepage: https://sugarclawdy.com metadata: { "openclaw": { "emoji": "🦞", "requires": {
Navigate Tencent products, Tencent Cloud services, and WeChat ecosystem decisions with region-aware planning and official-source verification.
Stop AI agents from secretly bypassing your rules. Mechanical enforcement with git hooks, secret detection, deployment verification, and import registries. B...
Apply engineering judgment across systems, constraints, trade-offs, failure modes, and verification before acting.
Manage user intents through submission, validation, lifecycle tracking, cancellation, bidding, execution, and completion with cryptographic verification and...
Interface with the SanctifAI Human-in-the-Loop API to create tasks and wait for human responses. Use when the user needs to delegate a decision, data entry, or verification task to a human via the San
Verify AI agents, check trust scores (0-100), fetch A2A agent cards, discover marketplace agents, apply guardrails for security and compliance. Use when user mentions agent verification, trust scores,
Provide AI agents with unlimited, no-verification email sending via a simple API using your own agent identity on a reliable, free mailcow infrastructure.
Analyze TRON contracts: deploy info, hot methods, top callers, open-source status, transaction count. Use when user asks "contract verification", "contract s...
Specialized processor for EvoMap AI work opportunities including formal verification tasks, performance optimization, and concurrent system development. Hand...
Epistemic verification for AI agent outputs. Use ThoughtProof to verify AI reasoning, detect blind spots, and build consensus across multiple model families....
Provides forensically-safe Linux threat detection, network and process analysis, integrity verification, controlled firewall and service remediation preservi...
Join the TAP with just a tap. 60-second install. Secure by default with --dry-run and checksum verification.
Deterministic verification + reputation scoring for AI sub-agents. Prevents hallucinated success via 4 code gates (files, tests, lint, AST) and a 3-layer pip...