AgentStead Deploy Skill
Deploy and manage AI agents on [AgentStead](https://agentstead.com) cloud hosting.
Best use case
AgentStead Deploy Skill is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Deploy and manage AI agents on [AgentStead](https://agentstead.com) cloud hosting.
Teams using AgentStead Deploy Skill should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/agentstead-deploy/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How AgentStead Deploy Skill Compares
| Feature / Agent | AgentStead Deploy Skill | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Deploy and manage AI agents on [AgentStead](https://agentstead.com) cloud hosting.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
Best AI Skills for Claude
Explore the best AI skills for Claude and Claude Code across coding, research, workflow automation, documentation, and agent operations.
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
SKILL.md Source
# AgentStead Deploy Skill
Deploy and manage AI agents on [AgentStead](https://agentstead.com) cloud hosting.
## Prerequisites
- An AgentStead account (sign up at https://agentstead.com/signup)
- `curl` and `jq` installed (standard on most systems)
- An auth token from logging in
## Authentication
First, log in to get an auth token. The skill provides a helper script that safely handles credentials:
```bash
# Save the deploy helper script
cat > /tmp/agentstead-deploy.sh << 'SCRIPT'
#!/bin/bash
# AgentStead Deploy Helper — handles JSON escaping safely
set -e
API="https://www.agentstead.com/api"
TOKEN_FILE="$HOME/.agentstead-token"
cmd_login() {
local email="${1:-$AGENTSTEAD_EMAIL}" password="${2:-$AGENTSTEAD_PASSWORD}"
if [ -z "$email" ]; then
read -p "Email: " email
fi
if [ -z "$password" ]; then
read -sp "Password: " password
echo
fi
local body
body=$(jq -n --arg e "$email" --arg p "$password" '{email: $e, password: $p}')
local resp
resp=$(curl -s -X POST "$API/auth/login" -H "Content-Type: application/json" -d "$body")
local token
token=$(echo "$resp" | jq -r '.token // empty')
if [ -z "$token" ]; then
echo "ERROR: Login failed — $(echo "$resp" | jq -r '.error // "unknown error"')" >&2
return 1
fi
echo "$token" > "$TOKEN_FILE"
chmod 600 "$TOKEN_FILE"
echo "OK: Logged in successfully"
}
cmd_create() {
local name="$1" plan="${2:-STARTER}" ai_plan="${3:-PAYG}" model="${4:-SONNET}"
local token
token=$(cat "$TOKEN_FILE" 2>/dev/null) || { echo "ERROR: Not logged in" >&2; return 1; }
local body
body=$(jq -n \
--arg name "$name" \
--arg plan "$plan" \
--arg aiPlan "$ai_plan" \
--arg model "$model" \
'{name: $name, plan: $plan, aiPlan: $aiPlan, defaultModel: $model}')
curl -s -X POST "$API/agents" \
-H "Content-Type: application/json" \
-H "x-cognito-id: $(cat "$TOKEN_FILE")" \
-d "$body" | jq .
}
cmd_configure() {
local agent_id="$1" personality="$2"
local token
token=$(cat "$TOKEN_FILE" 2>/dev/null) || { echo "ERROR: Not logged in" >&2; return 1; }
local body
body=$(jq -n --arg p "$personality" '{personality: $p}')
curl -s -X PATCH "$API/agents/$agent_id" \
-H "Content-Type: application/json" \
-H "x-cognito-id: $(cat "$TOKEN_FILE")" \
-d "$body" | jq .
}
cmd_channel() {
local agent_id="$1" type="$2" bot_token="$3"
local token
token=$(cat "$TOKEN_FILE" 2>/dev/null) || { echo "ERROR: Not logged in" >&2; return 1; }
local body
body=$(jq -n --arg t "$type" --arg bt "$bot_token" '{type: $t, config: {botToken: $bt}}')
curl -s -X POST "$API/agents/$agent_id/channels" \
-H "Content-Type: application/json" \
-H "x-cognito-id: $(cat "$TOKEN_FILE")" \
-d "$body" | jq .
}
cmd_start() {
local agent_id="$1"
local token
token=$(cat "$TOKEN_FILE" 2>/dev/null) || { echo "ERROR: Not logged in" >&2; return 1; }
curl -s -X POST "$API/agents/$agent_id/start" \
-H "Content-Type: application/json" \
-H "x-cognito-id: $(cat "$TOKEN_FILE")" | jq .
}
cmd_stop() {
local agent_id="$1"
local token
token=$(cat "$TOKEN_FILE" 2>/dev/null) || { echo "ERROR: Not logged in" >&2; return 1; }
curl -s -X POST "$API/agents/$agent_id/stop" \
-H "Content-Type: application/json" \
-H "x-cognito-id: $(cat "$TOKEN_FILE")" | jq .
}
cmd_list() {
local token
token=$(cat "$TOKEN_FILE" 2>/dev/null) || { echo "ERROR: Not logged in" >&2; return 1; }
curl -s "$API/agents" \
-H "x-cognito-id: $(cat "$TOKEN_FILE")" | jq '.agents[] | {id, name, status, plan, aiPlan, defaultModel}'
}
cmd_subscribe() {
local agent_id="$1" astd_cost="$2"
local token
token=$(cat "$TOKEN_FILE" 2>/dev/null) || { echo "ERROR: Not logged in" >&2; return 1; }
local body
body=$(jq -n --argjson cost "$astd_cost" '{planAstdCost: $cost}')
curl -s -X POST "$API/agents/$agent_id/subscribe-astd" \
-H "Content-Type: application/json" \
-H "x-cognito-id: $(cat "$TOKEN_FILE")" \
-d "$body" | jq .
}
case "$1" in
login) cmd_login "$2" "$3" ;;
create) cmd_create "$2" "$3" "$4" "$5" ;;
configure) cmd_configure "$2" "$3" ;;
channel) cmd_channel "$2" "$3" "$4" ;;
start) cmd_start "$2" ;;
stop) cmd_stop "$2" ;;
list) cmd_list ;;
subscribe) cmd_subscribe "$2" "$3" ;;
*) echo "Usage: agentstead-deploy.sh {login|create|configure|channel|start|stop|list|subscribe}" ;;
esac
SCRIPT
chmod +x /tmp/agentstead-deploy.sh
```
## Usage
### 1. Log in
```bash
# Option A: Use environment variables (recommended)
export AGENTSTEAD_EMAIL="user@example.com"
export AGENTSTEAD_PASSWORD="password123"
/tmp/agentstead-deploy.sh login
# Option B: Interactive prompts (password hidden)
/tmp/agentstead-deploy.sh login
# Option C: Pass email only, prompt for password
/tmp/agentstead-deploy.sh login "user@example.com"
```
### 2. Create an agent
```bash
# Args: name, hardware_plan, ai_plan, default_model
/tmp/agentstead-deploy.sh create "My Agent" "STARTER" "PAYG" "SONNET"
```
**Hardware plans:** STARTER ($9/mo), PRO ($29/mo), BUSINESS ($59/mo), ENTERPRISE ($99/mo)
**AI plans:** BYOK (bring your own key), PAYG (pay-as-you-go from ASTD wallet), ASTD_1000–ASTD_10000
**Models (AgentStead Provided):**
- Anthropic: HAIKU, SONNET, OPUS
- AWS Bedrock: BEDROCK_HAIKU, BEDROCK_SONNET, BEDROCK_OPUS, BEDROCK_HAIKU45, BEDROCK_NOVA_PRO, BEDROCK_NOVA_LITE, BEDROCK_NOVA_MICRO, BEDROCK_LLAMA4_MAVERICK, BEDROCK_LLAMA33_70B, BEDROCK_DEEPSEEK_R1, BEDROCK_MISTRAL_LARGE, BEDROCK_COMMAND_R_PLUS
- Ollama (free): DEEPSEEK_V3, QWEN3, LLAMA4, GEMMA3, MISTRAL_LARGE, GLM5, KIMI_K2, MINIMAX
### 3. Activate subscription (deduct ASTD from wallet)
```bash
# Args: agent_id, astd_cost (900=Starter, 2900=Pro, 5900=Business, 9900=Enterprise)
/tmp/agentstead-deploy.sh subscribe "agent-uuid-here" 900
```
### 4. Set personality
```bash
/tmp/agentstead-deploy.sh configure "agent-uuid-here" "You are a helpful coding assistant specializing in Python."
```
### 5. Add a channel (Telegram, Discord, WhatsApp, Slack)
```bash
/tmp/agentstead-deploy.sh channel "agent-uuid-here" "TELEGRAM" "123456:ABC-DEF..."
```
### 6. Start the agent
```bash
/tmp/agentstead-deploy.sh start "agent-uuid-here"
```
### 7. List agents
```bash
/tmp/agentstead-deploy.sh list
```
### 8. Stop an agent
```bash
/tmp/agentstead-deploy.sh stop "agent-uuid-here"
```
## Security
- All user input is passed through `jq` for safe JSON encoding — never interpolated directly into shell commands
- Auth tokens are stored in `$HOME/.agentstead-token` with 600 permissions (owner-only read)
- Credentials are read from environment variables or interactive prompts — never passed as CLI arguments
- All API calls use HTTPS
- Network access is restricted to agentstead.com onlyRelated Skills
multi-bot-deploy
OpenClaw 多 Bot 多 Agent 一键搭建技能。根据用户提供的 Bot 名称、职能、模型和飞书凭证,自动完成 Agent 创建、账号配置、路由绑定和验证测试全流程。
appdeploy
Deploy web apps with backend APIs, database, file storage, AI operations, authentication, realtime, and cron jobs. Use when the user asks to deploy or publish a website or web app and wants a public URL. Uses HTTP API via curl.
azion-deploy
Deploy applications, static sites, and edge functions to Azion using Azion CLI. Use when the user asks to deploy/publish to Azion, configure link/build/deploy flow, or troubleshoot Azion auth/project linking problems.
setup-deploy
Configure deployment settings for land-and-deploy. Detects your deploy platform (Fly.io, Render, Vercel, Netlify, Heroku, GitHub Actions, custom), production URL, health check endpoints, and deploy commands. Use when: "setup deploy", "configure deployment", "set up land-and-deploy", "how do I deploy".
land-and-deploy
Land and deploy workflow. Merges the PR, waits for CI and deploy, verifies production health via canary checks. Takes over after /ship creates the PR.
inspirai-deploy
智能部署工具 - 自动检测部署策略,预检查、发布、监控一体化。支持 K8s/Helm、Docker Compose、Vercel、Fly.io。Triggers: '部署', 'deploy', '发布', '上线', '预检查', '部署监控', 'helm upgrade', 'docker compose up'.
rocm_vllm_deployment
Production-ready vLLM deployment on AMD ROCm GPUs. Combines environment auto-check, model parameter detection, Docker Compose deployment, health verification, and functional testing with comprehensive logging and security best practices.
check-deployment-status
Check deployment status of PRs and commits using continuous-deployment MCP and UCS deployer MCP. Use when user asks "is this deployed", "check deployment", "deployment status", "is PR merged and deployed", "check UP status", "introduced to production", or provides a GitHub PR URL and wants deployment info.
camoufox-deploy
One-click deployment of camoufox anti-detection browser with modified agent-browser. Patches agent-browser to auto-detect camoufox/firefox from executable path instead of defaulting to chromium.
superrare-deploy
Deploy a SuperRare Sovereign ERC-721 collection on Ethereum or Base via Bankr. Uses the official RARE factory createSovereignBatchMint path, dry-runs by default, and records auditable deploy receipts.
Voice AI Agent Engineering — Complete Design, Build & Deploy System
> Build production-grade AI voice agents for phone calls, customer service, sales, and automation. Platform-agnostic methodology covering conversation design, voice UX, telephony integration, and scaling.
---
name: article-factory-wechat