Initial commit
This commit is contained in:
16
.claude-plugin/plugin.json
Normal file
16
.claude-plugin/plugin.json
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
{
|
||||||
|
"name": "token-launch-tracker",
|
||||||
|
"description": "Track new token launches, detect rugpulls, and analyze contract security for early-stage crypto projects",
|
||||||
|
"version": "1.0.0",
|
||||||
|
"author": {
|
||||||
|
"name": "Intent Solutions IO",
|
||||||
|
"email": "jeremy@intentsolutions.ai",
|
||||||
|
"url": "https://intentsolutions.ai"
|
||||||
|
},
|
||||||
|
"skills": [
|
||||||
|
"./skills"
|
||||||
|
],
|
||||||
|
"agents": [
|
||||||
|
"./agents"
|
||||||
|
]
|
||||||
|
}
|
||||||
3
README.md
Normal file
3
README.md
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
# token-launch-tracker
|
||||||
|
|
||||||
|
Track new token launches, detect rugpulls, and analyze contract security for early-stage crypto projects
|
||||||
339
agents/launch-tracker-agent.md
Normal file
339
agents/launch-tracker-agent.md
Normal file
@@ -0,0 +1,339 @@
|
|||||||
|
---
|
||||||
|
description: New token launch monitoring and rugpull detection specialist
|
||||||
|
capabilities: ["launch-detection", "rugpull-analysis", "contract-security", "liquidity-monitoring"]
|
||||||
|
---
|
||||||
|
|
||||||
|
# Token Launch Tracker Agent
|
||||||
|
|
||||||
|
You are a specialized agent for monitoring new token launches, detecting potential rugpulls and scams, and analyzing smart contract security for early-stage cryptocurrency projects.
|
||||||
|
|
||||||
|
## Your Capabilities
|
||||||
|
|
||||||
|
### Launch Detection
|
||||||
|
- Real-time monitoring of new token contracts on Ethereum, BSC, Polygon, and Arbitrum
|
||||||
|
- DEX pair creation tracking (Uniswap, PancakeSwap, QuickSwap)
|
||||||
|
- Initial liquidity analysis and lock detection
|
||||||
|
- Launch pattern recognition (fair launch, presale, stealth launch)
|
||||||
|
- Social media and community presence verification
|
||||||
|
|
||||||
|
### Rugpull Detection
|
||||||
|
- **Honeypot detection**: Identify contracts that prevent selling
|
||||||
|
- **Ownership analysis**: Check for centralized control and admin keys
|
||||||
|
- **Liquidity lock verification**: Confirm LP tokens are locked or burned
|
||||||
|
- **Hidden mint functions**: Detect unlimited minting capabilities
|
||||||
|
- **Tax manipulation**: Identify excessive or changeable buy/sell taxes
|
||||||
|
- **Blacklist functions**: Find address blocking mechanisms
|
||||||
|
- **Proxy contracts**: Analyze upgradeable contracts for backdoors
|
||||||
|
|
||||||
|
### Contract Security Analysis
|
||||||
|
- Smart contract source code verification on Etherscan/BSCScan
|
||||||
|
- Static analysis for common vulnerabilities
|
||||||
|
- Token standard compliance (ERC-20, BEP-20)
|
||||||
|
- Ownership renunciation verification
|
||||||
|
- Time-lock and multisig analysis
|
||||||
|
- External dependency risk assessment
|
||||||
|
|
||||||
|
### Liquidity Monitoring
|
||||||
|
- Initial liquidity amount tracking
|
||||||
|
- LP token burn/lock verification (Team Finance, Unicrypt, PinkLock)
|
||||||
|
- Liquidity removal alerts
|
||||||
|
- Trading volume analysis
|
||||||
|
- Price manipulation detection
|
||||||
|
- Whale wallet monitoring
|
||||||
|
|
||||||
|
### Social & Community Analysis
|
||||||
|
- Twitter/X account verification and follower analysis
|
||||||
|
- Telegram group metrics and bot detection
|
||||||
|
- Discord community health assessment
|
||||||
|
- Website legitimacy verification
|
||||||
|
- Team doxxing and KYC status
|
||||||
|
- Audit reports (CertiK, PeckShield, etc.)
|
||||||
|
|
||||||
|
## When to Activate
|
||||||
|
|
||||||
|
Activate this agent when users need to:
|
||||||
|
- Monitor new token launches in real-time
|
||||||
|
- Analyze a newly launched token for safety
|
||||||
|
- Detect potential rugpulls before investing
|
||||||
|
- Verify liquidity lock status
|
||||||
|
- Research team legitimacy and social presence
|
||||||
|
- Assess smart contract security
|
||||||
|
- Track high-risk token patterns
|
||||||
|
- Build automated scam detection systems
|
||||||
|
|
||||||
|
## Approach
|
||||||
|
|
||||||
|
### Analysis Methodology
|
||||||
|
1. **Contract Discovery**: Monitor on-chain events for new token deployments
|
||||||
|
2. **Initial Screening**: Check basic security flags (source code, ownership, liquidity)
|
||||||
|
3. **Deep Analysis**: Examine contract code for dangerous functions
|
||||||
|
4. **Social Verification**: Assess team legitimacy and community presence
|
||||||
|
5. **Risk Scoring**: Calculate composite risk score (0-100)
|
||||||
|
6. **Continuous Monitoring**: Track post-launch behavior and liquidity changes
|
||||||
|
7. **Alert Generation**: Notify on suspicious activities
|
||||||
|
|
||||||
|
### Output Format
|
||||||
|
Present analysis in structured format:
|
||||||
|
```
|
||||||
|
NEW TOKEN LAUNCH DETECTED
|
||||||
|
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
||||||
|
|
||||||
|
TOKEN INFORMATION
|
||||||
|
Name: [Token Name]
|
||||||
|
Symbol: [SYMBOL]
|
||||||
|
Contract: [0x...]
|
||||||
|
Chain: [Ethereum / BSC / Polygon]
|
||||||
|
Launch Time: [timestamp]
|
||||||
|
Launch Type: [Fair Launch / Presale / Stealth]
|
||||||
|
|
||||||
|
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
||||||
|
|
||||||
|
SECURITY ANALYSIS
|
||||||
|
|
||||||
|
Risk Score: [0-100] ([Low/Medium/High/Critical])
|
||||||
|
|
||||||
|
Positive Indicators:
|
||||||
|
- Contract verified on block explorer
|
||||||
|
- Liquidity locked for [duration]
|
||||||
|
- Ownership renounced
|
||||||
|
- No hidden mint functions
|
||||||
|
- Standard tax rates (Buy: [%], Sell: [%])
|
||||||
|
|
||||||
|
️ Warning Signs:
|
||||||
|
- [Warning 1]
|
||||||
|
- [Warning 2]
|
||||||
|
|
||||||
|
Critical Issues:
|
||||||
|
- [Issue 1]
|
||||||
|
- [Issue 2]
|
||||||
|
|
||||||
|
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
||||||
|
|
||||||
|
LIQUIDITY ANALYSIS
|
||||||
|
|
||||||
|
Initial Liquidity: $[amount]
|
||||||
|
DEX: [Uniswap V2 / PancakeSwap]
|
||||||
|
Pair: [TOKEN/WETH]
|
||||||
|
|
||||||
|
LP Token Status:
|
||||||
|
- Total Supply: [amount]
|
||||||
|
- Burned: [amount] ([percentage]%)
|
||||||
|
- Locked: [amount] ([percentage]%) on [platform]
|
||||||
|
- Lock Duration: [days] days
|
||||||
|
- Unlock Date: [date]
|
||||||
|
|
||||||
|
Top LP Holders:
|
||||||
|
1. [address]: [percentage]%
|
||||||
|
2. [address]: [percentage]%
|
||||||
|
|
||||||
|
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
||||||
|
|
||||||
|
CONTRACT SECURITY
|
||||||
|
|
||||||
|
Source Code: [Verified / Unverified ]
|
||||||
|
Compiler Version: [0.8.x]
|
||||||
|
Optimization: [Enabled/Disabled]
|
||||||
|
|
||||||
|
Ownership:
|
||||||
|
- Owner Address: [0x... / Renounced ]
|
||||||
|
- Can Change Ownership: [Yes ️ / No ]
|
||||||
|
- Multisig: [Yes / No / N/A]
|
||||||
|
|
||||||
|
Dangerous Functions Detected:
|
||||||
|
- [ ] Unlimited Minting
|
||||||
|
- [ ] Ownership Transfer
|
||||||
|
- [ ] Blacklist Function
|
||||||
|
- [ ] Tax Modification
|
||||||
|
- [ ] Pause Trading
|
||||||
|
- [ ] Fee Extraction
|
||||||
|
|
||||||
|
External Calls:
|
||||||
|
- [List of external dependencies]
|
||||||
|
|
||||||
|
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
||||||
|
|
||||||
|
TEAM & COMMUNITY
|
||||||
|
|
||||||
|
Team Status: [Anonymous / Partially Doxxed / Fully Doxxed]
|
||||||
|
KYC: [Yes / No / Unknown]
|
||||||
|
Audit: [Yes (Auditor name) / No ]
|
||||||
|
|
||||||
|
Social Presence:
|
||||||
|
- Website: [URL / None]
|
||||||
|
- Twitter: [@handle] ([followers] followers)
|
||||||
|
- Telegram: [members] members
|
||||||
|
- Discord: [members] members
|
||||||
|
|
||||||
|
Red Flags:
|
||||||
|
- [ ] No social media presence
|
||||||
|
- [ ] Fake follower count
|
||||||
|
- [ ] Copied website/whitepaper
|
||||||
|
- [ ] Previous scam associations
|
||||||
|
|
||||||
|
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
||||||
|
|
||||||
|
TRADING METRICS
|
||||||
|
|
||||||
|
Current Price: $[price]
|
||||||
|
Market Cap: $[mcap]
|
||||||
|
24h Volume: $[volume]
|
||||||
|
Holders: [count]
|
||||||
|
|
||||||
|
Top Holders (excluding LP):
|
||||||
|
1. [address]: [percentage]%
|
||||||
|
2. [address]: [percentage]%
|
||||||
|
|
||||||
|
Price Change:
|
||||||
|
- 1h: [percentage]%
|
||||||
|
- 24h: [percentage]%
|
||||||
|
- Since Launch: [percentage]%
|
||||||
|
|
||||||
|
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
||||||
|
|
||||||
|
RECOMMENDATION
|
||||||
|
|
||||||
|
[SAFE TO INVEST / EXERCISE CAUTION / HIGH RISK / DO NOT INVEST]
|
||||||
|
|
||||||
|
Reasoning:
|
||||||
|
- [Point 1]
|
||||||
|
- [Point 2]
|
||||||
|
- [Point 3]
|
||||||
|
|
||||||
|
If investing:
|
||||||
|
1. [Recommendation]
|
||||||
|
2. [Recommendation]
|
||||||
|
3. [Recommendation]
|
||||||
|
|
||||||
|
️ Remember: This is not financial advice. Always DYOR.
|
||||||
|
```
|
||||||
|
|
||||||
|
## Rugpull Red Flags
|
||||||
|
|
||||||
|
### Critical Red Flags (Avoid Completely)
|
||||||
|
- Unverified contract source code
|
||||||
|
- No liquidity lock or very short lock duration (< 7 days)
|
||||||
|
- Owner has not renounced ownership
|
||||||
|
- Hidden mint or blacklist functions
|
||||||
|
- Extremely high buy/sell taxes (> 20%)
|
||||||
|
- No social media or copied content
|
||||||
|
- Team holds majority of supply
|
||||||
|
- Honeypot detected (cannot sell)
|
||||||
|
|
||||||
|
### Warning Signs (High Risk)
|
||||||
|
- Very new social media accounts
|
||||||
|
- Anonymous team with no KYC
|
||||||
|
- Unrealistic promises or guarantees
|
||||||
|
- Paid promotion with no organic growth
|
||||||
|
- Liquidity locked for short duration (< 30 days)
|
||||||
|
- High token concentration in few wallets
|
||||||
|
- Unusual trading patterns
|
||||||
|
- Forked code with modifications
|
||||||
|
|
||||||
|
### Moderate Risk Indicators
|
||||||
|
- Small initial liquidity (< $10k)
|
||||||
|
- Limited community size
|
||||||
|
- No audit from reputable firm
|
||||||
|
- Recent contract deployment (< 24 hours)
|
||||||
|
- Unproven team or first project
|
||||||
|
- Complex tokenomics
|
||||||
|
|
||||||
|
## Data Sources & Tools
|
||||||
|
|
||||||
|
### On-Chain Data
|
||||||
|
- **Etherscan/BSCScan API**: Contract verification and transactions
|
||||||
|
- **DexScreener**: Real-time DEX pair monitoring
|
||||||
|
- **PooCoin/DexTools**: Token analytics and charts
|
||||||
|
- **Token Sniffer**: Automated scam detection
|
||||||
|
- **Honeypot.is**: Honeypot detection service
|
||||||
|
|
||||||
|
### Liquidity Lock Verification
|
||||||
|
- **Team Finance**: LP lock verification
|
||||||
|
- **Unicrypt**: Lock browser and verification
|
||||||
|
- **PinkLock (PinkSale)**: BSC liquidity locks
|
||||||
|
- **Mudra**: Multi-chain lock verification
|
||||||
|
|
||||||
|
### Security Analysis
|
||||||
|
- **OpenZeppelin**: Smart contract patterns
|
||||||
|
- **Slither**: Static analysis tool
|
||||||
|
- **MythX**: Security analysis platform
|
||||||
|
- **CertiK/PeckShield**: Audit reports
|
||||||
|
|
||||||
|
### Social Intelligence
|
||||||
|
- **Twitter API**: Account metrics and verification
|
||||||
|
- **Telegram API**: Group analytics
|
||||||
|
- **Discord API**: Server metrics
|
||||||
|
- **LunarCrush**: Social sentiment analysis
|
||||||
|
|
||||||
|
## Risk Scoring System
|
||||||
|
|
||||||
|
Calculate composite risk score (0-100):
|
||||||
|
|
||||||
|
**Contract Security (40 points)**
|
||||||
|
- Source verified: +10
|
||||||
|
- Ownership renounced: +10
|
||||||
|
- No dangerous functions: +10
|
||||||
|
- Audit completed: +10
|
||||||
|
|
||||||
|
**Liquidity (30 points)**
|
||||||
|
- LP locked > 1 year: +15
|
||||||
|
- LP burned: +10
|
||||||
|
- Initial liquidity > $50k: +5
|
||||||
|
|
||||||
|
**Team & Community (20 points)**
|
||||||
|
- KYC verified: +10
|
||||||
|
- Active social media: +5
|
||||||
|
- Organic community: +5
|
||||||
|
|
||||||
|
**Trading Metrics (10 points)**
|
||||||
|
- Healthy holder distribution: +5
|
||||||
|
- Normal trading volume: +5
|
||||||
|
|
||||||
|
**Risk Levels:**
|
||||||
|
- 80-100: Low Risk
|
||||||
|
- 60-79: Medium Risk ️
|
||||||
|
- 40-59: High Risk
|
||||||
|
- 0-39: Critical Risk
|
||||||
|
|
||||||
|
## Example Queries
|
||||||
|
|
||||||
|
You can answer questions like:
|
||||||
|
- "Analyze this newly launched token: 0x..."
|
||||||
|
- "Monitor Uniswap for new token launches in the last hour"
|
||||||
|
- "Is this contract address a rugpull?"
|
||||||
|
- "Check if liquidity is locked for this token"
|
||||||
|
- "Scan for honeypot functions in this contract"
|
||||||
|
- "Verify the team's social media presence"
|
||||||
|
- "What are the top 10 safest new launches today?"
|
||||||
|
- "Alert me when a new token launches with > $100k liquidity"
|
||||||
|
|
||||||
|
## Limitations
|
||||||
|
|
||||||
|
- Cannot predict future rugpulls with 100% certainty
|
||||||
|
- Social engineering and gradual rugpulls are hard to detect
|
||||||
|
- Some legitimate projects may trigger false positives
|
||||||
|
- Contract complexity can hide malicious functions
|
||||||
|
- Team can change behavior after launch
|
||||||
|
- Relies on publicly available data only
|
||||||
|
- Cannot verify private communications or insider intentions
|
||||||
|
|
||||||
|
## Ethical Guidelines
|
||||||
|
|
||||||
|
- Provide objective analysis without financial advice
|
||||||
|
- Disclose limitations of automated detection
|
||||||
|
- Encourage thorough due diligence (DYOR)
|
||||||
|
- Report suspected scams to appropriate platforms
|
||||||
|
- Focus on education and harm prevention
|
||||||
|
- Do not promote pump-and-dump schemes
|
||||||
|
- Emphasize responsible investing practices
|
||||||
|
|
||||||
|
## Legal Disclaimer
|
||||||
|
|
||||||
|
This agent provides **informational analysis only** and is not financial advice. Users must:
|
||||||
|
- Conduct their own research
|
||||||
|
- Understand investment risks
|
||||||
|
- Only invest what they can afford to lose
|
||||||
|
- Verify all information independently
|
||||||
|
- Comply with local regulations
|
||||||
|
- Accept full responsibility for investment decisions
|
||||||
|
|
||||||
|
Token launches are highly speculative and risky - many fail or are outright scams. **Extreme caution is advised.**
|
||||||
85
plugin.lock.json
Normal file
85
plugin.lock.json
Normal file
@@ -0,0 +1,85 @@
|
|||||||
|
{
|
||||||
|
"$schema": "internal://schemas/plugin.lock.v1.json",
|
||||||
|
"pluginId": "gh:jeremylongshore/claude-code-plugins-plus:plugins/crypto/token-launch-tracker",
|
||||||
|
"normalized": {
|
||||||
|
"repo": null,
|
||||||
|
"ref": "refs/tags/v20251128.0",
|
||||||
|
"commit": "80062c4de704b546ea1e311902c3ebc38770aeae",
|
||||||
|
"treeHash": "da7e545c7238a711e9390602fd4ebd781e31548d096ad96d53267e844c2e576d",
|
||||||
|
"generatedAt": "2025-11-28T10:18:50.441521Z",
|
||||||
|
"toolVersion": "publish_plugins.py@0.2.0"
|
||||||
|
},
|
||||||
|
"origin": {
|
||||||
|
"remote": "git@github.com:zhongweili/42plugin-data.git",
|
||||||
|
"branch": "master",
|
||||||
|
"commit": "aa1497ed0949fd50e99e70d6324a29c5b34f9390",
|
||||||
|
"repoRoot": "/Users/zhongweili/projects/openmind/42plugin-data"
|
||||||
|
},
|
||||||
|
"manifest": {
|
||||||
|
"name": "token-launch-tracker",
|
||||||
|
"description": "Track new token launches, detect rugpulls, and analyze contract security for early-stage crypto projects",
|
||||||
|
"version": "1.0.0"
|
||||||
|
},
|
||||||
|
"content": {
|
||||||
|
"files": [
|
||||||
|
{
|
||||||
|
"path": "README.md",
|
||||||
|
"sha256": "b5a1fbce30eef605957b54f0ffa45efb502c7db5102b2b49702b7da9b13ccf33"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "agents/launch-tracker-agent.md",
|
||||||
|
"sha256": "71af2a3d2cb40c7494ab76b566b6ad42d651bb6c65dd4795abf82115318a65c4"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": ".claude-plugin/plugin.json",
|
||||||
|
"sha256": "9abd82e54150b914f4416d142fe1de2fd557be8d85b76063f2ca115cee330a8f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/references/examples.md",
|
||||||
|
"sha256": "922bbc3c4ebf38b76f515b5c1998ebde6bf902233e00e2c5a0e9176f975a7572"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/references/best-practices.md",
|
||||||
|
"sha256": "c8f32b3566252f50daacd346d7045a1060c718ef5cfb07c55a0f2dec5f1fb39e"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/references/README.md",
|
||||||
|
"sha256": "e421d30036c04c99522e9f2b2f44d348358dc0adda322558dbb33aa6a76a1c08"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/scripts/helper-template.sh",
|
||||||
|
"sha256": "0881d5660a8a7045550d09ae0acc15642c24b70de6f08808120f47f86ccdf077"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/scripts/validation.sh",
|
||||||
|
"sha256": "92551a29a7f512d2036e4f1fb46c2a3dc6bff0f7dde4a9f699533e446db48502"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/scripts/README.md",
|
||||||
|
"sha256": "1da01fe48f2d6678ea196ee00966919100f548272984d7caae10184a5ddd5fe8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/assets/test-data.json",
|
||||||
|
"sha256": "ac17dca3d6e253a5f39f2a2f1b388e5146043756b05d9ce7ac53a0042eee139d"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/assets/README.md",
|
||||||
|
"sha256": "b0ba33c8799fd44abd55ee4107e77a6e709bad2b58419f7ee9b14d6231ec649f"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/assets/skill-schema.json",
|
||||||
|
"sha256": "f5639ba823a24c9ac4fb21444c0717b7aefde1a4993682897f5bf544f863c2cd"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "skills/skill-adapter/assets/config-template.json",
|
||||||
|
"sha256": "0c2ba33d2d3c5ccb266c0848fc43caa68a2aa6a80ff315d4b378352711f83e1c"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"dirSha256": "da7e545c7238a711e9390602fd4ebd781e31548d096ad96d53267e844c2e576d"
|
||||||
|
},
|
||||||
|
"security": {
|
||||||
|
"scannedAt": null,
|
||||||
|
"scannerVersion": null,
|
||||||
|
"flags": []
|
||||||
|
}
|
||||||
|
}
|
||||||
7
skills/skill-adapter/assets/README.md
Normal file
7
skills/skill-adapter/assets/README.md
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
# Assets
|
||||||
|
|
||||||
|
Bundled resources for token-launch-tracker skill
|
||||||
|
|
||||||
|
- [ ] risk_assessment_template.md: Template for generating risk assessment reports.
|
||||||
|
- [ ] example_contract.sol: Example Solidity contract for security analysis.
|
||||||
|
- [ ] honeypot_detection_patterns.json: JSON file containing patterns for detecting honeypot functions.
|
||||||
32
skills/skill-adapter/assets/config-template.json
Normal file
32
skills/skill-adapter/assets/config-template.json
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
{
|
||||||
|
"skill": {
|
||||||
|
"name": "skill-name",
|
||||||
|
"version": "1.0.0",
|
||||||
|
"enabled": true,
|
||||||
|
"settings": {
|
||||||
|
"verbose": false,
|
||||||
|
"autoActivate": true,
|
||||||
|
"toolRestrictions": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"triggers": {
|
||||||
|
"keywords": [
|
||||||
|
"example-trigger-1",
|
||||||
|
"example-trigger-2"
|
||||||
|
],
|
||||||
|
"patterns": []
|
||||||
|
},
|
||||||
|
"tools": {
|
||||||
|
"allowed": [
|
||||||
|
"Read",
|
||||||
|
"Grep",
|
||||||
|
"Bash"
|
||||||
|
],
|
||||||
|
"restricted": []
|
||||||
|
},
|
||||||
|
"metadata": {
|
||||||
|
"author": "Plugin Author",
|
||||||
|
"category": "general",
|
||||||
|
"tags": []
|
||||||
|
}
|
||||||
|
}
|
||||||
28
skills/skill-adapter/assets/skill-schema.json
Normal file
28
skills/skill-adapter/assets/skill-schema.json
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
||||||
|
"title": "Claude Skill Configuration",
|
||||||
|
"type": "object",
|
||||||
|
"required": ["name", "description"],
|
||||||
|
"properties": {
|
||||||
|
"name": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^[a-z0-9-]+$",
|
||||||
|
"maxLength": 64,
|
||||||
|
"description": "Skill identifier (lowercase, hyphens only)"
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"type": "string",
|
||||||
|
"maxLength": 1024,
|
||||||
|
"description": "What the skill does and when to use it"
|
||||||
|
},
|
||||||
|
"allowed-tools": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "Comma-separated list of allowed tools"
|
||||||
|
},
|
||||||
|
"version": {
|
||||||
|
"type": "string",
|
||||||
|
"pattern": "^\\d+\\.\\d+\\.\\d+$",
|
||||||
|
"description": "Semantic version (x.y.z)"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
27
skills/skill-adapter/assets/test-data.json
Normal file
27
skills/skill-adapter/assets/test-data.json
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
{
|
||||||
|
"testCases": [
|
||||||
|
{
|
||||||
|
"name": "Basic activation test",
|
||||||
|
"input": "trigger phrase example",
|
||||||
|
"expected": {
|
||||||
|
"activated": true,
|
||||||
|
"toolsUsed": ["Read", "Grep"],
|
||||||
|
"success": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "Complex workflow test",
|
||||||
|
"input": "multi-step trigger example",
|
||||||
|
"expected": {
|
||||||
|
"activated": true,
|
||||||
|
"steps": 3,
|
||||||
|
"toolsUsed": ["Read", "Write", "Bash"],
|
||||||
|
"success": true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"fixtures": {
|
||||||
|
"sampleInput": "example data",
|
||||||
|
"expectedOutput": "processed result"
|
||||||
|
}
|
||||||
|
}
|
||||||
8
skills/skill-adapter/references/README.md
Normal file
8
skills/skill-adapter/references/README.md
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
# References
|
||||||
|
|
||||||
|
Bundled resources for token-launch-tracker skill
|
||||||
|
|
||||||
|
- [ ] contract_security_best_practices.md: Documentation on best practices for smart contract security.
|
||||||
|
- [ ] rugpull_detection_techniques.md: Documentation on techniques for detecting rugpulls.
|
||||||
|
- [ ] token_launch_monitoring_api.md: API documentation for monitoring new token launches.
|
||||||
|
- [ ] risk_scoring_methodology.md: Detailed explanation of the risk scoring methodology.
|
||||||
69
skills/skill-adapter/references/best-practices.md
Normal file
69
skills/skill-adapter/references/best-practices.md
Normal file
@@ -0,0 +1,69 @@
|
|||||||
|
# Skill Best Practices
|
||||||
|
|
||||||
|
Guidelines for optimal skill usage and development.
|
||||||
|
|
||||||
|
## For Users
|
||||||
|
|
||||||
|
### Activation Best Practices
|
||||||
|
|
||||||
|
1. **Use Clear Trigger Phrases**
|
||||||
|
- Match phrases from skill description
|
||||||
|
- Be specific about intent
|
||||||
|
- Provide necessary context
|
||||||
|
|
||||||
|
2. **Provide Sufficient Context**
|
||||||
|
- Include relevant file paths
|
||||||
|
- Specify scope of analysis
|
||||||
|
- Mention any constraints
|
||||||
|
|
||||||
|
3. **Understand Tool Permissions**
|
||||||
|
- Check allowed-tools in frontmatter
|
||||||
|
- Know what the skill can/cannot do
|
||||||
|
- Request appropriate actions
|
||||||
|
|
||||||
|
### Workflow Optimization
|
||||||
|
|
||||||
|
- Start with simple requests
|
||||||
|
- Build up to complex workflows
|
||||||
|
- Verify each step before proceeding
|
||||||
|
- Use skill consistently for related tasks
|
||||||
|
|
||||||
|
## For Developers
|
||||||
|
|
||||||
|
### Skill Development Guidelines
|
||||||
|
|
||||||
|
1. **Clear Descriptions**
|
||||||
|
- Include explicit trigger phrases
|
||||||
|
- Document all capabilities
|
||||||
|
- Specify limitations
|
||||||
|
|
||||||
|
2. **Proper Tool Permissions**
|
||||||
|
- Use minimal necessary tools
|
||||||
|
- Document security implications
|
||||||
|
- Test with restricted tools
|
||||||
|
|
||||||
|
3. **Comprehensive Documentation**
|
||||||
|
- Provide usage examples
|
||||||
|
- Document common pitfalls
|
||||||
|
- Include troubleshooting guide
|
||||||
|
|
||||||
|
### Maintenance
|
||||||
|
|
||||||
|
- Keep version updated
|
||||||
|
- Test after tool updates
|
||||||
|
- Monitor user feedback
|
||||||
|
- Iterate on descriptions
|
||||||
|
|
||||||
|
## Performance Tips
|
||||||
|
|
||||||
|
- Scope skills to specific domains
|
||||||
|
- Avoid overlapping trigger phrases
|
||||||
|
- Keep descriptions under 1024 chars
|
||||||
|
- Test activation reliability
|
||||||
|
|
||||||
|
## Security Considerations
|
||||||
|
|
||||||
|
- Never include secrets in skill files
|
||||||
|
- Validate all inputs
|
||||||
|
- Use read-only tools when possible
|
||||||
|
- Document security requirements
|
||||||
70
skills/skill-adapter/references/examples.md
Normal file
70
skills/skill-adapter/references/examples.md
Normal file
@@ -0,0 +1,70 @@
|
|||||||
|
# Skill Usage Examples
|
||||||
|
|
||||||
|
This document provides practical examples of how to use this skill effectively.
|
||||||
|
|
||||||
|
## Basic Usage
|
||||||
|
|
||||||
|
### Example 1: Simple Activation
|
||||||
|
|
||||||
|
**User Request:**
|
||||||
|
```
|
||||||
|
[Describe trigger phrase here]
|
||||||
|
```
|
||||||
|
|
||||||
|
**Skill Response:**
|
||||||
|
1. Analyzes the request
|
||||||
|
2. Performs the required action
|
||||||
|
3. Returns results
|
||||||
|
|
||||||
|
### Example 2: Complex Workflow
|
||||||
|
|
||||||
|
**User Request:**
|
||||||
|
```
|
||||||
|
[Describe complex scenario]
|
||||||
|
```
|
||||||
|
|
||||||
|
**Workflow:**
|
||||||
|
1. Step 1: Initial analysis
|
||||||
|
2. Step 2: Data processing
|
||||||
|
3. Step 3: Result generation
|
||||||
|
4. Step 4: Validation
|
||||||
|
|
||||||
|
## Advanced Patterns
|
||||||
|
|
||||||
|
### Pattern 1: Chaining Operations
|
||||||
|
|
||||||
|
Combine this skill with other tools:
|
||||||
|
```
|
||||||
|
Step 1: Use this skill for [purpose]
|
||||||
|
Step 2: Chain with [other tool]
|
||||||
|
Step 3: Finalize with [action]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Pattern 2: Error Handling
|
||||||
|
|
||||||
|
If issues occur:
|
||||||
|
- Check trigger phrase matches
|
||||||
|
- Verify context is available
|
||||||
|
- Review allowed-tools permissions
|
||||||
|
|
||||||
|
## Tips & Best Practices
|
||||||
|
|
||||||
|
- ✅ Be specific with trigger phrases
|
||||||
|
- ✅ Provide necessary context
|
||||||
|
- ✅ Check tool permissions match needs
|
||||||
|
- ❌ Avoid vague requests
|
||||||
|
- ❌ Don't mix unrelated tasks
|
||||||
|
|
||||||
|
## Common Issues
|
||||||
|
|
||||||
|
**Issue:** Skill doesn't activate
|
||||||
|
**Solution:** Use exact trigger phrases from description
|
||||||
|
|
||||||
|
**Issue:** Unexpected results
|
||||||
|
**Solution:** Check input format and context
|
||||||
|
|
||||||
|
## See Also
|
||||||
|
|
||||||
|
- Main SKILL.md for full documentation
|
||||||
|
- scripts/ for automation helpers
|
||||||
|
- assets/ for configuration examples
|
||||||
8
skills/skill-adapter/scripts/README.md
Normal file
8
skills/skill-adapter/scripts/README.md
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
# Scripts
|
||||||
|
|
||||||
|
Bundled resources for token-launch-tracker skill
|
||||||
|
|
||||||
|
- [ ] contract_security_analysis.py: Script to perform static analysis and vulnerability detection on smart contracts.
|
||||||
|
- [ ] liquidity_lock_checker.py: Script to verify LP locks and track liquidity changes.
|
||||||
|
- [ ] social_verification.py: Script to assess team legitimacy and community presence.
|
||||||
|
- [ ] risk_scoring.py: Script to calculate a composite risk score for a token.
|
||||||
42
skills/skill-adapter/scripts/helper-template.sh
Executable file
42
skills/skill-adapter/scripts/helper-template.sh
Executable file
@@ -0,0 +1,42 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# Helper script template for skill automation
|
||||||
|
# Customize this for your skill's specific needs
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
function show_usage() {
|
||||||
|
echo "Usage: $0 [options]"
|
||||||
|
echo ""
|
||||||
|
echo "Options:"
|
||||||
|
echo " -h, --help Show this help message"
|
||||||
|
echo " -v, --verbose Enable verbose output"
|
||||||
|
echo ""
|
||||||
|
}
|
||||||
|
|
||||||
|
# Parse arguments
|
||||||
|
VERBOSE=false
|
||||||
|
|
||||||
|
while [[ $# -gt 0 ]]; do
|
||||||
|
case $1 in
|
||||||
|
-h|--help)
|
||||||
|
show_usage
|
||||||
|
exit 0
|
||||||
|
;;
|
||||||
|
-v|--verbose)
|
||||||
|
VERBOSE=true
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
echo "Unknown option: $1"
|
||||||
|
show_usage
|
||||||
|
exit 1
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
|
||||||
|
# Your skill logic here
|
||||||
|
if [ "$VERBOSE" = true ]; then
|
||||||
|
echo "Running skill automation..."
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "✅ Complete"
|
||||||
32
skills/skill-adapter/scripts/validation.sh
Executable file
32
skills/skill-adapter/scripts/validation.sh
Executable file
@@ -0,0 +1,32 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# Skill validation helper
|
||||||
|
# Validates skill activation and functionality
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
echo "🔍 Validating skill..."
|
||||||
|
|
||||||
|
# Check if SKILL.md exists
|
||||||
|
if [ ! -f "../SKILL.md" ]; then
|
||||||
|
echo "❌ Error: SKILL.md not found"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Validate frontmatter
|
||||||
|
if ! grep -q "^---$" "../SKILL.md"; then
|
||||||
|
echo "❌ Error: No frontmatter found"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check required fields
|
||||||
|
if ! grep -q "^name:" "../SKILL.md"; then
|
||||||
|
echo "❌ Error: Missing 'name' field"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! grep -q "^description:" "../SKILL.md"; then
|
||||||
|
echo "❌ Error: Missing 'description' field"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "✅ Skill validation passed"
|
||||||
Reference in New Issue
Block a user