clawdi 0.5.10 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +42 -8
- package/dist/index.js +310 -228
- package/package.json +2 -1
package/README.md
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
<h1 align="center">Clawdi</h1>
|
|
2
2
|
|
|
3
3
|
<p align="center">
|
|
4
|
-
<strong>The best home for all your AI agents —
|
|
4
|
+
<strong>The best home for all your AI agents — Projects, sessions, memory, skills, cron jobs, and app connections.</strong>
|
|
5
5
|
</p>
|
|
6
6
|
|
|
7
7
|
<p align="center">
|
|
@@ -72,8 +72,9 @@ Clawdi is the shared layer underneath:
|
|
|
72
72
|
|
|
73
73
|
- **Cross-agent memory** — Store durable preferences, decisions, facts, and project context once. Search them from any connected agent.
|
|
74
74
|
- **Portable skills** — Upload or install agent instructions once, then sync them into every registered agent.
|
|
75
|
+
- **Project sharing** — Share read-only Project access, accept it from the CLI inbox, and explicitly attach accepted Projects to Agents when they should be used at runtime.
|
|
75
76
|
- **Session sync** — Push local session history to the dashboard for review and recall.
|
|
76
|
-
- **Vault secrets** — Store secrets server-side
|
|
77
|
+
- **Vault secrets** — Store secrets server-side, commit only `clawdi://` references, and resolve them at runtime.
|
|
77
78
|
- **App connections** — Hook agents into Notion, Gmail, Drive, Calendar, Linear, GitHub, and more from the dashboard. Tools show up inside every connected agent automatically over MCP.
|
|
78
79
|
- **MCP tools** — Memory, vault, and connector tools served through the Model Context Protocol so any MCP-aware agent can use them.
|
|
79
80
|
|
|
@@ -85,13 +86,39 @@ remember that this repo uses Bun for TypeScript and PDM for backend scripts
|
|
|
85
86
|
|
|
86
87
|
Later, in a different agent or a fresh session, ask "what package manager should I use here?" — it can call Clawdi memory search and answer from your actual context instead of guessing.
|
|
87
88
|
|
|
88
|
-
Run a command with vault
|
|
89
|
+
Run a fullstack dev command with vault references without putting plaintext secrets on disk:
|
|
89
90
|
|
|
90
91
|
```bash
|
|
91
92
|
clawdi vault set OPENAI_API_KEY
|
|
92
|
-
clawdi
|
|
93
|
+
echo "OPENAI_API_KEY=clawdi://project/<project-id>/vault/default/field/OPENAI_API_KEY" > .env.clawdi
|
|
94
|
+
clawdi run --dry-run --env-file .env.clawdi -- npm run dev
|
|
95
|
+
clawdi run --env-file .env.clawdi -- npm run dev
|
|
96
|
+
clawdi read clawdi://project/<project-id>/vault/default/field/OPENAI_API_KEY
|
|
97
|
+
clawdi inject --dry-run --in .env.clawdi --out .env.local
|
|
98
|
+
clawdi inject --force --in .env.clawdi --out .env.local
|
|
93
99
|
```
|
|
94
100
|
|
|
101
|
+
`clawdi vault set`, `clawdi vault import`, and `clawdi vault list` print exact references that include the Project ID. Project-relative references such as `clawdi://default/OPENAI_API_KEY` still work for portable templates, but exact references are the default copy/read UX.
|
|
102
|
+
|
|
103
|
+
Agents should prefer `clawdi run --env-file .env.clawdi -- <command>` when they can launch the tool themselves. Use `clawdi inject` only for tools that must read a physical `.env.local`; generated files are written owner-only and should stay gitignored.
|
|
104
|
+
|
|
105
|
+
Use `--dry-run` on `clawdi read`, `clawdi inject`, `clawdi run`, and `clawdi vault resolve` to verify provenance without requesting plaintext values. `clawdi doctor` checks vault metadata only; it does not resolve stored secrets.
|
|
106
|
+
|
|
107
|
+
Sync a local agent CLI credential profile to another machine:
|
|
108
|
+
|
|
109
|
+
```bash
|
|
110
|
+
clawdi agent credentials import codex
|
|
111
|
+
clawdi agent credentials import claude-code
|
|
112
|
+
clawdi agent credentials import gh
|
|
113
|
+
clawdi agent credentials materialize codex
|
|
114
|
+
clawdi agent credentials materialize claude-code
|
|
115
|
+
clawdi agent credentials materialize gh
|
|
116
|
+
```
|
|
117
|
+
|
|
118
|
+
Credential profile sync is separate from `clawdi run`: it stores and restores a supported tool's local auth file, while `run` injects explicit `clawdi://` references into one child process. Profiles default to your stable Personal Project so `import` on one machine and `materialize` on another resolve the same namespace. They are personal backup/restore artifacts: shared Project viewers and env-bound Agent keys cannot materialize them. macOS Keychain imports are guarded behind `--source keychain` and require explicit `--keychain-service` plus `--keychain-account`; Clawdi does not guess or silently scrape credential-store items, and Keychain reads cannot use `--yes`.
|
|
119
|
+
|
|
120
|
+
Current vault storage is server-managed encryption. Clawdi avoids plaintext secrets in repo files and local templates, but the backend can decrypt stored vault values and credential profiles today. Do not treat this release as zero-knowledge.
|
|
121
|
+
|
|
95
122
|
Install a shared skill into every registered agent at once:
|
|
96
123
|
|
|
97
124
|
```bash
|
|
@@ -108,9 +135,9 @@ The first is autonomy. Agents should work without you at the keyboard.
|
|
|
108
135
|
- Remote control for agents on any of your machines.
|
|
109
136
|
- Automatic memory built from session history.
|
|
110
137
|
|
|
111
|
-
The second is making Clawdi multi-player.
|
|
138
|
+
The second is making Clawdi multi-player. Project sharing now covers read-only Project access in the CLI/backend; dashboard surfaces and richer team roles come next.
|
|
112
139
|
|
|
113
|
-
- Shared memory, skills, and connections, with access controls.
|
|
140
|
+
- Shared memory, skills, and connections, with broader access controls.
|
|
114
141
|
- An agent-to-agent channel for handoff and ask-for-help.
|
|
115
142
|
- Task tracking that every connected agent can use.
|
|
116
143
|
|
|
@@ -221,8 +248,15 @@ Each agent has a dedicated adapter in [`packages/cli/src/adapters`](https://gith
|
|
|
221
248
|
| `clawdi pull` | Download cloud skills into registered agents |
|
|
222
249
|
| `clawdi memory list/search/add/rm` | Manage cross-agent long-term memory |
|
|
223
250
|
| `clawdi skill list/add/install/rm/init` | Manage portable skills |
|
|
224
|
-
| `clawdi
|
|
225
|
-
| `clawdi
|
|
251
|
+
| `clawdi project create/list/show/share/share-links/invite/invites/members/leave/unshare` | Manage Projects and read-only sharing |
|
|
252
|
+
| `clawdi inbox [accept/decline/forget]` | Accept invitations and share links |
|
|
253
|
+
| `clawdi agent projects list/attach/detach/move` | View the fixed Agent Project and manage attached Projects |
|
|
254
|
+
| `clawdi agent credentials import/materialize` | Sync local CLI credential profiles for Codex, Claude Code, and GitHub CLI; explicit Keychain import requires service/account options |
|
|
255
|
+
| `clawdi project folder link/status/unlink` | Link a local folder to a Project for vault reference selection |
|
|
256
|
+
| `clawdi vault set/list/import` | Manage encrypted secrets and copy exact references |
|
|
257
|
+
| `clawdi read <clawdi://...>` | Explicitly print one vault reference value |
|
|
258
|
+
| `clawdi inject --in <file> --out <file>` | Render `clawdi://` references into templates |
|
|
259
|
+
| `clawdi run --env-file <file> -- <cmd>` | Run a command with explicit vault references resolved |
|
|
226
260
|
| `clawdi doctor` | Diagnose auth, agent paths, vault, and MCP config |
|
|
227
261
|
| `clawdi update` | Check for a newer CLI version |
|
|
228
262
|
| `clawdi mcp` | Start the MCP stdio server used by agents |
|