clawdi 0.5.10 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/README.md +42 -8
  2. package/dist/index.js +310 -228
  3. package/package.json +2 -1
package/README.md CHANGED
@@ -1,7 +1,7 @@
1
1
  <h1 align="center">Clawdi</h1>
2
2
 
3
3
  <p align="center">
4
- <strong>The best home for all your AI agents — environments, sessions, memory, skills, cron jobs, and app connections.</strong>
4
+ <strong>The best home for all your AI agents — Projects, sessions, memory, skills, cron jobs, and app connections.</strong>
5
5
  </p>
6
6
 
7
7
  <p align="center">
@@ -72,8 +72,9 @@ Clawdi is the shared layer underneath:
72
72
 
73
73
  - **Cross-agent memory** — Store durable preferences, decisions, facts, and project context once. Search them from any connected agent.
74
74
  - **Portable skills** — Upload or install agent instructions once, then sync them into every registered agent.
75
+ - **Project sharing** — Share read-only Project access, accept it from the CLI inbox, and explicitly attach accepted Projects to Agents when they should be used at runtime.
75
76
  - **Session sync** — Push local session history to the dashboard for review and recall.
76
- - **Vault secrets** — Store secrets server-side and inject them only when running a command.
77
+ - **Vault secrets** — Store secrets server-side, commit only `clawdi://` references, and resolve them at runtime.
77
78
  - **App connections** — Hook agents into Notion, Gmail, Drive, Calendar, Linear, GitHub, and more from the dashboard. Tools show up inside every connected agent automatically over MCP.
78
79
  - **MCP tools** — Memory, vault, and connector tools served through the Model Context Protocol so any MCP-aware agent can use them.
79
80
 
@@ -85,13 +86,39 @@ remember that this repo uses Bun for TypeScript and PDM for backend scripts
85
86
 
86
87
  Later, in a different agent or a fresh session, ask "what package manager should I use here?" — it can call Clawdi memory search and answer from your actual context instead of guessing.
87
88
 
88
- Run a command with vault secrets without putting them on disk:
89
+ Run a fullstack dev command with vault references without putting plaintext secrets on disk:
89
90
 
90
91
  ```bash
91
92
  clawdi vault set OPENAI_API_KEY
92
- clawdi run -- python scripts/ingest.py
93
+ echo "OPENAI_API_KEY=clawdi://project/<project-id>/vault/default/field/OPENAI_API_KEY" > .env.clawdi
94
+ clawdi run --dry-run --env-file .env.clawdi -- npm run dev
95
+ clawdi run --env-file .env.clawdi -- npm run dev
96
+ clawdi read clawdi://project/<project-id>/vault/default/field/OPENAI_API_KEY
97
+ clawdi inject --dry-run --in .env.clawdi --out .env.local
98
+ clawdi inject --force --in .env.clawdi --out .env.local
93
99
  ```
94
100
 
101
+ `clawdi vault set`, `clawdi vault import`, and `clawdi vault list` print exact references that include the Project ID. Project-relative references such as `clawdi://default/OPENAI_API_KEY` still work for portable templates, but exact references are the default copy/read UX.
102
+
103
+ Agents should prefer `clawdi run --env-file .env.clawdi -- <command>` when they can launch the tool themselves. Use `clawdi inject` only for tools that must read a physical `.env.local`; generated files are written owner-only and should stay gitignored.
104
+
105
+ Use `--dry-run` on `clawdi read`, `clawdi inject`, `clawdi run`, and `clawdi vault resolve` to verify provenance without requesting plaintext values. `clawdi doctor` checks vault metadata only; it does not resolve stored secrets.
106
+
107
+ Sync a local agent CLI credential profile to another machine:
108
+
109
+ ```bash
110
+ clawdi agent credentials import codex
111
+ clawdi agent credentials import claude-code
112
+ clawdi agent credentials import gh
113
+ clawdi agent credentials materialize codex
114
+ clawdi agent credentials materialize claude-code
115
+ clawdi agent credentials materialize gh
116
+ ```
117
+
118
+ Credential profile sync is separate from `clawdi run`: it stores and restores a supported tool's local auth file, while `run` injects explicit `clawdi://` references into one child process. Profiles default to your stable Personal Project so `import` on one machine and `materialize` on another resolve the same namespace. They are personal backup/restore artifacts: shared Project viewers and env-bound Agent keys cannot materialize them. macOS Keychain imports are guarded behind `--source keychain` and require explicit `--keychain-service` plus `--keychain-account`; Clawdi does not guess or silently scrape credential-store items, and Keychain reads cannot use `--yes`.
119
+
120
+ Current vault storage is server-managed encryption. Clawdi avoids plaintext secrets in repo files and local templates, but the backend can decrypt stored vault values and credential profiles today. Do not treat this release as zero-knowledge.
121
+
95
122
  Install a shared skill into every registered agent at once:
96
123
 
97
124
  ```bash
@@ -108,9 +135,9 @@ The first is autonomy. Agents should work without you at the keyboard.
108
135
  - Remote control for agents on any of your machines.
109
136
  - Automatic memory built from session history.
110
137
 
111
- The second is making Clawdi multi-player. Today every Clawdi belongs to one person. That's the wrong shape for teams.
138
+ The second is making Clawdi multi-player. Project sharing now covers read-only Project access in the CLI/backend; dashboard surfaces and richer team roles come next.
112
139
 
113
- - Shared memory, skills, and connections, with access controls.
140
+ - Shared memory, skills, and connections, with broader access controls.
114
141
  - An agent-to-agent channel for handoff and ask-for-help.
115
142
  - Task tracking that every connected agent can use.
116
143
 
@@ -221,8 +248,15 @@ Each agent has a dedicated adapter in [`packages/cli/src/adapters`](https://gith
221
248
  | `clawdi pull` | Download cloud skills into registered agents |
222
249
  | `clawdi memory list/search/add/rm` | Manage cross-agent long-term memory |
223
250
  | `clawdi skill list/add/install/rm/init` | Manage portable skills |
224
- | `clawdi vault set/list/import` | Manage encrypted secrets |
225
- | `clawdi run -- <cmd>` | Run a command with vault secrets injected |
251
+ | `clawdi project create/list/show/share/share-links/invite/invites/members/leave/unshare` | Manage Projects and read-only sharing |
252
+ | `clawdi inbox [accept/decline/forget]` | Accept invitations and share links |
253
+ | `clawdi agent projects list/attach/detach/move` | View the fixed Agent Project and manage attached Projects |
254
+ | `clawdi agent credentials import/materialize` | Sync local CLI credential profiles for Codex, Claude Code, and GitHub CLI; explicit Keychain import requires service/account options |
255
+ | `clawdi project folder link/status/unlink` | Link a local folder to a Project for vault reference selection |
256
+ | `clawdi vault set/list/import` | Manage encrypted secrets and copy exact references |
257
+ | `clawdi read <clawdi://...>` | Explicitly print one vault reference value |
258
+ | `clawdi inject --in <file> --out <file>` | Render `clawdi://` references into templates |
259
+ | `clawdi run --env-file <file> -- <cmd>` | Run a command with explicit vault references resolved |
226
260
  | `clawdi doctor` | Diagnose auth, agent paths, vault, and MCP config |
227
261
  | `clawdi update` | Check for a newer CLI version |
228
262
  | `clawdi mcp` | Start the MCP stdio server used by agents |