AICP Protocol
v1.0.0AI Compact Protocol (AICP) - Token-efficient wire format for AI-to-AI communication with glossary compression. Reduces token usage by 50-65% for agent chatter.
⭐ 0· 72·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the included components: protocol parser/serializer (protocol.py), an agent bridge (agent_bridge.py), and an OpenClaw integration CLI (openclaw_aicp.py). The single required binary (python3) is appropriate and proportional.
Instruction Scope
SKILL.md and README provide usage examples and local install instructions (git clone / clawhub), and do not instruct the agent to read unrelated files, exfiltrate data, or access system credentials. Runtime instructions and demos operate on in-memory data and stdout only.
Install Mechanism
No external install spec is provided; the package includes pure-Python source and a requirements.txt claiming no external deps. No network downloads or archive extraction are invoked by the skill itself. The only external repository referenced is a GitHub repo URL in docs (expected for open-source projects).
Credentials
The skill requests no environment variables or credentials and does not reference config paths. There are no secrets-like env names in code. Behavior is limited to local serialization/parsing and printing; credential access would be disproportionate and is not present.
Persistence & Privilege
Skill does not request permanent or elevated presence (always:false). It does not modify other skills or system configuration; active state (active_sessions) is kept in-memory only. Autonomous invocation is allowed by default but that is the platform norm and not combined with other red flags here.
Assessment
This package appears internally consistent and implements a compact wire format as described. Before installing or running: (1) review the bundled Python source if you don't fully trust the repo (there are no network calls or credential usage, so risk is limited), (2) run it in a restricted environment if you plan to process sensitive data (the protocol only serializes/parses whatever you give it), and (3) note some minor implementation quirks (e.g., glossary parsing replaces underscores with spaces) that could affect round-trip fidelity—test with representative data before integrating into production workflows.Like a lobster shell, security has layers — review code before you run it.
latestvk97acxvxbst5m7vm1akybw6jph83hndt
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📡 Clawdis
Binspython3
