@quanta-intellect/vessel-browser 0.1.18 → 0.1.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -84,6 +84,7 @@ Today, Vessel provides the browser shell, page visibility, and supervisory surfa
84
84
  - **Structured Page Visibility Context** — extraction can report in-viewport elements, obscured controls, active overlays, and dormant consent/modal UI
85
85
  - **Popup Recovery Tools** — agents can explicitly dismiss common popups, newsletter gates, and consent walls instead of brute-forcing generic clicks
86
86
  - **Per-Tab Ad Blocking Controls** — tabs default to ad blocking on, but agents can selectively disable and re-enable blocking when a page misbehaves
87
+ - **Agent Credential Vault** (Premium) — encrypted credential storage for agent-driven logins; credentials are filled directly into login forms via a "blind fill" pattern and are never sent to AI providers; user consent dialog before every use; TOTP 2FA support; domain-scoped access; append-only audit log
87
88
  - **Obsidian Memory Hooks** — optional vault path for agent-written markdown notes, page captures, and research breadcrumbs
88
89
  - **Runtime Health Checks** — startup warnings for MCP port conflicts, unreadable settings, and user-data write failures
89
90
  - **Reader Mode** — extract article content into a clean, distraction-free view; toggle on and off from the address bar
@@ -246,6 +247,21 @@ Named session tools exposed today include:
246
247
 
247
248
  Session files are sensitive because they may contain login cookies and tokens. Vessel stores them under the app user-data directory with restrictive file permissions.
248
249
 
250
+ Agent Credential Vault tools (Premium):
251
+
252
+ - `vessel_vault_status` — check whether stored credentials exist for a domain (returns labels/usernames, never passwords)
253
+ - `vessel_vault_login` — fill a login form using stored credentials (blind fill — credentials go directly into the page, never into the AI conversation)
254
+ - `vessel_vault_totp` — generate and fill a TOTP 2FA code from a stored secret
255
+
256
+ Vault security model:
257
+
258
+ - Credentials are encrypted at rest using AES-256-GCM with a key protected by the OS keychain (Electron safeStorage)
259
+ - Credential values are **never** sent to AI providers — they flow only through the main process to the content script
260
+ - Every credential use triggers a user consent dialog ("Allow Once" / "Allow for Session" / "Deny")
261
+ - All credential access is recorded in an append-only audit log
262
+ - Credentials are domain-scoped — they can only be used on matching domains
263
+ - Users manage credentials in Settings > Agent Credential Vault
264
+
249
265
  Notable extraction modes include:
250
266
 
251
267
  - `visible_only` — only currently visible, in-viewport, unobstructed interactive elements plus active overlays
@@ -361,6 +377,7 @@ src/
361
377
  │ ├── content/ # Readability extraction, reader mode
362
378
  │ ├── config/ # Settings persistence
363
379
  │ ├── ipc/ # IPC handler registry
380
+ │ ├── vault/ # Agent Credential Vault (encrypted storage, consent, audit)
364
381
  │ ├── mcp/ # MCP server for external agent control
365
382
  │ ├── devtools/ # CDP session management for Dev Tools panel
366
383
  │ ├── window.ts # Window layout manager