@aiconnect/confidant 1.4.1 → 1.4.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/README.md +44 -1
  2. package/package.json +3 -2
package/README.md CHANGED
@@ -29,6 +29,23 @@ Confidant provides a **pull-based secret handoff**:
29
29
 
30
30
  The secret never passes through chat. It's a direct handshake between human and AI.
31
31
 
32
+ ## For AI Agents (ClawHub Skill)
33
+
34
+ If you're running an AI agent like [Clawdbot](https://github.com/clawdbot/clawdbot), you can teach it secure secret handling by installing the Confidant skill from [ClawHub](https://www.clawhub.ai):
35
+
36
+ ```bash
37
+ clawdhub install confidant
38
+ ```
39
+
40
+ Once installed, your agent learns how to:
41
+ - Request secrets from users without exposing them in chat
42
+ - Deliver secrets to users securely
43
+ - Exchange credentials with other agents
44
+
45
+ 👉 **[View on ClawHub](https://www.clawhub.ai/skills/confidant)**
46
+
47
+ ---
48
+
32
49
  ## Quick Start
33
50
 
34
51
  ### Fastest (One Command with npx)
@@ -243,11 +260,37 @@ Share credentials securely with teammates:
243
260
  confidant create --secret "temp-password" --ttl 300000
244
261
  ```
245
262
 
263
+ ## Agent-to-User Communication
264
+
265
+ When your AI assistant needs to securely deliver a secret to the user (generated password, API key, credential), the flow reverses: the user becomes the receiver.
266
+
267
+ ### How It Works
268
+
269
+ 1. **User creates a request** → Runs `serve-request` to create a URL
270
+ 2. **User shares the URL** → Sends it to the AI assistant
271
+ 3. **AI submits the secret** → Uses the `fill` command
272
+ 4. **User receives the secret** → Appears directly in their terminal
273
+
274
+ ### Example Flow
275
+
276
+ ```bash
277
+ # User runs this (they will receive the secret)
278
+ confidant serve-request --label "Generated Password"
279
+ # → http://localhost:3000/requests/abc123...
280
+
281
+ # AI executes this to send the secret
282
+ confidant fill "http://localhost:3000/requests/abc123..." --secret "my-secure-password-123"
283
+ ```
284
+
285
+ The secret travels securely from AI → server → user terminal, never appearing in chat.
286
+
287
+ ---
288
+
246
289
  ## Agent-to-Agent Communication
247
290
 
248
291
  Confidant supports direct secret submission between automated agents without requiring a browser. This enables fully automated credential sharing scenarios.
249
292
 
250
- ### Use Cases
293
+ ### When to Use
251
294
 
252
295
  - **Orchestrators**: Central systems distributing secrets to multiple agents
253
296
  - **Multi-agent AI**: LLM agents dynamically sharing credentials
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aiconnect/confidant",
3
- "version": "1.4.1",
3
+ "version": "1.4.2",
4
4
  "description": "Secure secret handoff system with time-limited access",
5
5
  "main": "dist/index.js",
6
6
  "module": "dist/index.js",
@@ -36,7 +36,8 @@
36
36
  "release:patch": "npm version patch",
37
37
  "release:minor": "npm version minor",
38
38
  "release:major": "npm version major",
39
- "publish:npm": "npm publish --access public"
39
+ "publish:npm": "npm publish --access public",
40
+ "skill:publish": "npx clawdhub publish ./clawdbot/skill --slug confidant --registry \"https://www.clawhub.ai\""
40
41
  },
41
42
  "keywords": [
42
43
  "secret",