keyco

v1.0.0

Manage Keyco assets, DUBs (QR/NFC/BLE/Virtual beacons), workflows, lifecycle events, users, and analytics. Use when the user asks about Keyco, asset manageme...

0· 84·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for husamabdel/keyco.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "keyco" (husamabdel/keyco) from ClawHub.
Skill page: https://clawhub.ai/husamabdel/keyco
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install keyco

ClawHub CLI

Package manager switcher

npx clawhub@latest install keyco
Security Scan
Capability signals
Requires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included documentation and CLI commands. The SKILL.md and references describe using the Keyco CLI (api.qrdub.com / dashboard.qrdub.com) to manage DUBs/assets, lifecycles, workflows, users, and analytics — everything in the bundle (command reference, scope guidance, setup script) is consistent with that purpose.
Instruction Scope
Runtime instructions are limited to checking/using the Keyco CLI, running Keyco commands with --output json, and running the included setup script if the CLI is missing or not configured. The setup script only checks ~/.keyco.yaml, runs keyco status, and invokes keyco configure interactively. The SKILL.md explicitly forbids circumventing audit flows (no manual location edits or out-of-band workflow completion). No instructions ask the agent to access unrelated system files or external endpoints beyond Keyco dashboard/API hosts.
Install Mechanism
There is no builtin install spec, but the included setup script will run npm install -g @keyco/cli (and retry with sudo if needed). Installing a global npm package is an expected way to get a CLI, but it is a moderate-risk action because it pulls code from the npm registry and may require elevated privileges (sudo). This is proportionate to a CLI integration but worth a manual check before running.
Credentials
The skill does not declare or require unrelated environment variables or credentials. It legitimately expects the user to provide a Keyco API key (kc_live_*) via the CLI or ~ /.keyco.yaml; the included docs note KEYCO_API_KEY as an environment override, which is expected for CLI tooling. No unrelated secrets or high-scope credentials are requested.
Persistence & Privilege
The skill is not always-enabled and does not request persistent elevated privileges or modify other skills. It can be invoked by the agent (normal), but there are no additional privileged behaviors in the bundle.
Assessment
This skill appears to do what it claims (manage Keyco assets via the Keyco CLI). Before running anything: 1) Review the npm package @keyco/cli on the public registry (npmjs.com) to confirm publisher/trust; 2) Be aware the provided setup script may run npm install -g and fall back to sudo (you may be prompted for your password) — run it manually rather than allowing automatic execution if you prefer; 3) Only use API keys with the minimum scopes needed (the docs list recommended scopes) and never paste your Keyco API key into an untrusted chat; 4) If you have doubts about the dashboard URLs (dashboard.qrdub.com / api.qrdub.com), verify them with your organization. Overall: safe and coherent, but exercise standard caution when installing global packages and supplying API keys.

Like a lobster shell, security has layers — review code before you run it.

latestvk978hbyh89eg77k7756ppp3qr984ze01
84downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

Keyco Skill

This skill uses the Keyco CLI to manage assets (DUBs), workflows, lifecycle events, users, notifications, and analytics through the Keyco platform (api.qrdub.com).

When to Use This Skill

Invoke this skill when the user:

  • Asks about Keyco assets, DUBs, or inventory
  • Needs to look up a specific asset by UUID
  • Wants to check asset lifecycle events, maintenance, or compliance
  • Requests workflow status, asset assignments, or utilization reports
  • Asks for analytics (weekly digest, stale assets, summaries)
  • Wants to manage notifications, groups, or API keys
  • Mentions api.qrdub.com, keyco.io, kc_live_*, or the keyco CLI
  • Wants to script asset operations (bulk ops, CI/CD automation)

Prerequisites

Before running any command, verify the CLI is installed and configured:

  1. Check if keyco is on PATH: which keyco

  2. Check configuration: keyco status

  3. If either check fails, run the setup script — it handles install + configure in one shot:

    bash scripts/setup-keyco.sh
    

    The script will:

    • Install @keyco/cli globally via npm if missing (falling back to sudo npm if needed)
    • Skip install if already present
    • Walk the user through keyco configure if no valid API key is set
    • Verify connectivity at the end

    Always offer to run this script before failing — don't ask the user to manually install or configure.

Core Workflow

1. Identify the user's intent

Map their request to one of the Keyco domains:

IntentCommand family
Look up asset / inventorykeyco dub get, keyco dub list, keyco dub search
Asset location / trackingkeyco dub location history, keyco dub map-data
Lifecycle eventskeyco lifecycles create, keyco lifecycles get
Workflowskeyco workflows list, keyco workflows get, keyco workflows dubs
Users & assignmentskeyco user list, keyco user assigned-dubs, keyco user unassigned-dubs
Analytics & reportskeyco analytics summary, keyco analytics weekly-digest, keyco analytics stale-assets
Groupskeyco groups list, keyco groups dubs
Notificationskeyco notifications list, keyco notifications unread-count
API keyskeyco api-keys list, keyco api-keys create

2. Run commands with --output json for programmatic parsing

Always append --output json when you need to parse or transform the data. Use --output table only when displaying directly to the user.

3. Handle errors

  • 401 / 403: API key missing, expired, or lacking required scope — tell the user to run keyco configure or create a key with the needed scope
  • 404: Resource doesn't exist — double-check the UUID with the user
  • 429: Rate limited — back off and retry
  • Connection errors: Check keyco status to verify reachability

4. Summarize results for the user

Don't just dump raw JSON — extract the key fields and present them clearly. Offer follow-up actions (e.g., "Want me to check its location history too?").

Data Integrity — IMPORTANT

The following operations have been intentionally removed from the Keyco CLI because they bypass authoritative scan/heartbeat events and break the audit trail:

  • Manual DUB location updates
  • Marking workflows complete out-of-band
  • Advancing workflow steps without a verified DUB scan

Never try to work around these restrictions. If the user asks to "set" or "update" a DUB's location or manually complete a workflow, explain that these actions must happen via the physical scan/event flow (QR scan, NFC tap, BLE heartbeat) to preserve audit integrity. Direct them to support@keycomagix.com if they need an override for legitimate reasons.

Output Format

When presenting asset data to the user:

Asset: <dubname>
UUID: <uuid>
Type: <QR | Pro | Active | Virtual>
Status: <active | inactive>
Group: <group name>
Assigned to: <user email or "Unassigned">
Last seen: <timestamp>

When running analytics, lead with the top-line numbers, then break down by category.

Examples

User: "What assets does alice@company.com have?" → keyco user list --output json to find her user ID, then → keyco user assigned-dubs --user-id <UUID> --output json → Summarize: "Alice has N assets assigned: [list]"

User: "Create a maintenance event for DUB ee6f2f42-31b1-4f90-9440-e91fb02ac7c4 due next Friday" → Compute the absolute date from "next Friday" → keyco lifecycles create --event-type MAINTENANCE --name "Maintenance" --assigned-dub ee6f2f42-31b1-4f90-9440-e91fb02ac7c4 --due-date 2026-04-24 → Confirm creation to the user with the returned event ID

User: "Show me this week's analytics" → keyco analytics weekly-digest --output json → Summarize top-line metrics (total assets, active workflows, open lifecycle events, utilization %)

User: "Find any stale assets" → keyco analytics stale-assets --output json → Report the count and list the first few, offering to create maintenance events or reassign them

User: "Import 50 assets from this CSV" → Explain that bulk CSV import goes through POST /api/imports/upload (not yet in CLI) — suggest they use the dashboard at https://dashboard.qrdub.com or loop over keyco lifecycles create / asset endpoints individually

Scripting Recipes

For multi-step tasks, compose commands with standard shell tools:

# Export all DUBs as JSON
keyco dub list --size 1000 --output json > all-dubs.json

# Find assets with no assigned user
keyco user unassigned-dubs --output json | jq '.[] | .uuid'

# Stale asset count for CI
STALE=$(keyco analytics stale-assets --output json | jq '.totalElements')
echo "$STALE stale assets detected"

References

Comments

Loading comments...