A2A Hub
v1.3.0Manage the MoltBot A2A Hub — register agents, search the registry, relay messages, and stream responses. Use when working with the A2A agent-to-agent protocol hub deployed at a2a-hub.fly.dev.
⭐ 2· 1.2k·1 current·1 all-time
by@myrodar
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md content: all examples are HTTP calls to the documented hub endpoints and the actions (register, search, relay, stream) align with the stated purpose.
Instruction Scope
SKILL.md contains only curl examples and protocol documentation against the hub URL; it does not instruct the agent to read local files, environment variables, or send data to other endpoints outside the hub.
Install Mechanism
No install spec and no code files are present (instruction-only), so nothing is written to disk or downloaded during install.
Credentials
The skill declares no required env vars or credentials. Optional fields in requests (e.g., upstreamApiKey) are part of the hub API and are proportionate to registering an agent that needs auth for its upstream endpoint.
Persistence & Privilege
always is false and there are no indications the skill attempts to modify other skills or system settings; the skill is user-invocable and does not request persistent elevated privileges.
Assessment
This is an instruction-only skill that documents how to use a public A2A relay at https://a2a-hub.fly.dev. Before using it: (1) verify you trust the hub operator (source/homepage unknown) because messages proxied through the hub may be logged; (2) avoid registering sensitive endpoints or embedding long-lived secrets unless you trust the hub—the upstreamApiKey you provide will be sent to the hub and may be stored; (3) rotate any API keys you expose to the hub and use scoped keys where possible; (4) respect the documented rate limits when automating calls; and (5) if you need stronger privacy, consider running your own hub or proxy rather than using this public service.Like a lobster shell, security has layers — review code before you run it.
latestvk97ffr8dqh3ndryfazqw79w3ys80tqnz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
