discord-hub

Verified·Scanned 2/17/2026

OpenClaw skill for Discord Bot API workflows, covering interactions, commands, messages, and operations using direct HTTPS requests.

from clawhub.ai·v173adb2·6.1 KB·0 installs
Scanned from 1.1.0 at 173adb2 · Transparency log ↗
$ vett add clawhub.ai/codedao12/discord-hub

Discord Bot API Skill (Advanced)

Purpose

Provide a production-oriented guide for building Discord bot workflows via the REST API and Interactions, focusing on professional command UX, safe operations, and direct HTTPS usage (no SDKs).

Best fit

  • You want command-first bot behavior and clear interaction flows.
  • You prefer direct HTTP requests without a library dependency.
  • You need a structured map of Discord API surfaces.

Not a fit

  • You need a full SDK or gateway client implementation.
  • You plan to stream large media uploads directly.

Quick orientation

  • Read references/discord-api-overview.md for base URL, versioning, and object map.
  • Read references/discord-auth-and-tokens.md for token types and security boundaries.
  • Read references/discord-interactions.md for interaction lifecycle and response patterns.
  • Read references/discord-app-commands.md for slash, user, and message commands.
  • Read references/discord-messages-components.md for messages, embeds, and components.
  • Read references/discord-gateway-webhooks.md for gateway vs webhook tradeoffs.
  • Read references/discord-rate-limits.md for throttling and header-based handling.
  • Read references/discord-request-templates.md for HTTP payload templates.
  • Read references/discord-feature-map.md for the full surface checklist.

Required inputs

  • Bot token and application ID.
  • Interaction endpoint public key (if using interaction webhooks).
  • Command list and UX tone.
  • Allowed intents and event scope.

Expected output

  • A clear bot workflow plan, command design, and operational checklist.

Operational notes

  • Prefer interactions and slash commands over prefix parsing.
  • Always validate incoming interaction signatures.
  • Keep payloads small and respond quickly to interactions.

Security notes

  • Never log tokens or secrets.
  • Use least-privilege permissions and scopes.