@aiconnect/confidant 1.4.1 → 1.4.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +44 -1
- package/package.json +3 -2
package/README.md
CHANGED
|
@@ -29,6 +29,23 @@ Confidant provides a **pull-based secret handoff**:
|
|
|
29
29
|
|
|
30
30
|
The secret never passes through chat. It's a direct handshake between human and AI.
|
|
31
31
|
|
|
32
|
+
## For AI Agents (ClawHub Skill)
|
|
33
|
+
|
|
34
|
+
If you're running an AI agent like [Clawdbot](https://github.com/clawdbot/clawdbot), you can teach it secure secret handling by installing the Confidant skill from [ClawHub](https://www.clawhub.ai):
|
|
35
|
+
|
|
36
|
+
```bash
|
|
37
|
+
clawdhub install confidant
|
|
38
|
+
```
|
|
39
|
+
|
|
40
|
+
Once installed, your agent learns how to:
|
|
41
|
+
- Request secrets from users without exposing them in chat
|
|
42
|
+
- Deliver secrets to users securely
|
|
43
|
+
- Exchange credentials with other agents
|
|
44
|
+
|
|
45
|
+
👉 **[View on ClawHub](https://www.clawhub.ai/skills/confidant)**
|
|
46
|
+
|
|
47
|
+
---
|
|
48
|
+
|
|
32
49
|
## Quick Start
|
|
33
50
|
|
|
34
51
|
### Fastest (One Command with npx)
|
|
@@ -243,11 +260,37 @@ Share credentials securely with teammates:
|
|
|
243
260
|
confidant create --secret "temp-password" --ttl 300000
|
|
244
261
|
```
|
|
245
262
|
|
|
263
|
+
## Agent-to-User Communication
|
|
264
|
+
|
|
265
|
+
When your AI assistant needs to securely deliver a secret to the user (generated password, API key, credential), the flow reverses: the user becomes the receiver.
|
|
266
|
+
|
|
267
|
+
### How It Works
|
|
268
|
+
|
|
269
|
+
1. **User creates a request** → Runs `serve-request` to create a URL
|
|
270
|
+
2. **User shares the URL** → Sends it to the AI assistant
|
|
271
|
+
3. **AI submits the secret** → Uses the `fill` command
|
|
272
|
+
4. **User receives the secret** → Appears directly in their terminal
|
|
273
|
+
|
|
274
|
+
### Example Flow
|
|
275
|
+
|
|
276
|
+
```bash
|
|
277
|
+
# User runs this (they will receive the secret)
|
|
278
|
+
confidant serve-request --label "Generated Password"
|
|
279
|
+
# → http://localhost:3000/requests/abc123...
|
|
280
|
+
|
|
281
|
+
# AI executes this to send the secret
|
|
282
|
+
confidant fill "http://localhost:3000/requests/abc123..." --secret "my-secure-password-123"
|
|
283
|
+
```
|
|
284
|
+
|
|
285
|
+
The secret travels securely from AI → server → user terminal, never appearing in chat.
|
|
286
|
+
|
|
287
|
+
---
|
|
288
|
+
|
|
246
289
|
## Agent-to-Agent Communication
|
|
247
290
|
|
|
248
291
|
Confidant supports direct secret submission between automated agents without requiring a browser. This enables fully automated credential sharing scenarios.
|
|
249
292
|
|
|
250
|
-
### Use
|
|
293
|
+
### When to Use
|
|
251
294
|
|
|
252
295
|
- **Orchestrators**: Central systems distributing secrets to multiple agents
|
|
253
296
|
- **Multi-agent AI**: LLM agents dynamically sharing credentials
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aiconnect/confidant",
|
|
3
|
-
"version": "1.4.
|
|
3
|
+
"version": "1.4.2",
|
|
4
4
|
"description": "Secure secret handoff system with time-limited access",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"module": "dist/index.js",
|
|
@@ -36,7 +36,8 @@
|
|
|
36
36
|
"release:patch": "npm version patch",
|
|
37
37
|
"release:minor": "npm version minor",
|
|
38
38
|
"release:major": "npm version major",
|
|
39
|
-
"publish:npm": "npm publish --access public"
|
|
39
|
+
"publish:npm": "npm publish --access public",
|
|
40
|
+
"skill:publish": "npx clawdhub publish ./clawdbot/skill --slug confidant --registry \"https://www.clawhub.ai\""
|
|
40
41
|
},
|
|
41
42
|
"keywords": [
|
|
42
43
|
"secret",
|