clawdi 0.6.0 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/README.md +35 -6
  2. package/dist/index.js +242 -220
  3. package/package.json +2 -1
package/README.md CHANGED
@@ -74,7 +74,7 @@ Clawdi is the shared layer underneath:
74
74
  - **Portable skills** — Upload or install agent instructions once, then sync them into every registered agent.
75
75
  - **Project sharing** — Share read-only Project access, accept it from the CLI inbox, and explicitly attach accepted Projects to Agents when they should be used at runtime.
76
76
  - **Session sync** — Push local session history to the dashboard for review and recall.
77
- - **Vault secrets** — Store secrets server-side and inject them only when running a command.
77
+ - **Vault secrets** — Store secrets server-side, commit only `clawdi://` references, and resolve them at runtime.
78
78
  - **App connections** — Hook agents into Notion, Gmail, Drive, Calendar, Linear, GitHub, and more from the dashboard. Tools show up inside every connected agent automatically over MCP.
79
79
  - **MCP tools** — Memory, vault, and connector tools served through the Model Context Protocol so any MCP-aware agent can use them.
80
80
 
@@ -86,13 +86,39 @@ remember that this repo uses Bun for TypeScript and PDM for backend scripts
86
86
 
87
87
  Later, in a different agent or a fresh session, ask "what package manager should I use here?" — it can call Clawdi memory search and answer from your actual context instead of guessing.
88
88
 
89
- Run a command with vault secrets without putting them on disk:
89
+ Run a fullstack dev command with vault references without putting plaintext secrets on disk:
90
90
 
91
91
  ```bash
92
92
  clawdi vault set OPENAI_API_KEY
93
- clawdi run -- python scripts/ingest.py
93
+ echo "OPENAI_API_KEY=clawdi://project/<project-id>/vault/default/field/OPENAI_API_KEY" > .env.clawdi
94
+ clawdi run --dry-run --env-file .env.clawdi -- npm run dev
95
+ clawdi run --env-file .env.clawdi -- npm run dev
96
+ clawdi read clawdi://project/<project-id>/vault/default/field/OPENAI_API_KEY
97
+ clawdi inject --dry-run --in .env.clawdi --out .env.local
98
+ clawdi inject --force --in .env.clawdi --out .env.local
94
99
  ```
95
100
 
101
+ `clawdi vault set`, `clawdi vault import`, and `clawdi vault list` print exact references that include the Project ID. Project-relative references such as `clawdi://default/OPENAI_API_KEY` still work for portable templates, but exact references are the default copy/read UX.
102
+
103
+ Agents should prefer `clawdi run --env-file .env.clawdi -- <command>` when they can launch the tool themselves. Use `clawdi inject` only for tools that must read a physical `.env.local`; generated files are written owner-only and should stay gitignored.
104
+
105
+ Use `--dry-run` on `clawdi read`, `clawdi inject`, `clawdi run`, and `clawdi vault resolve` to verify provenance without requesting plaintext values. `clawdi doctor` checks vault metadata only; it does not resolve stored secrets.
106
+
107
+ Sync a local agent CLI credential profile to another machine:
108
+
109
+ ```bash
110
+ clawdi agent credentials import codex
111
+ clawdi agent credentials import claude-code
112
+ clawdi agent credentials import gh
113
+ clawdi agent credentials materialize codex
114
+ clawdi agent credentials materialize claude-code
115
+ clawdi agent credentials materialize gh
116
+ ```
117
+
118
+ Credential profile sync is separate from `clawdi run`: it stores and restores a supported tool's local auth file, while `run` injects explicit `clawdi://` references into one child process. Profiles default to your stable Personal Project so `import` on one machine and `materialize` on another resolve the same namespace. They are personal backup/restore artifacts: shared Project viewers and env-bound Agent keys cannot materialize them. macOS Keychain imports are guarded behind `--source keychain` and require explicit `--keychain-service` plus `--keychain-account`; Clawdi does not guess or silently scrape credential-store items, and Keychain reads cannot use `--yes`.
119
+
120
+ Current vault storage is server-managed encryption. Clawdi avoids plaintext secrets in repo files and local templates, but the backend can decrypt stored vault values and credential profiles today. Do not treat this release as zero-knowledge.
121
+
96
122
  Install a shared skill into every registered agent at once:
97
123
 
98
124
  ```bash
@@ -225,9 +251,12 @@ Each agent has a dedicated adapter in [`packages/cli/src/adapters`](https://gith
225
251
  | `clawdi project create/list/show/share/share-links/invite/invites/members/leave/unshare` | Manage Projects and read-only sharing |
226
252
  | `clawdi inbox [accept/decline/forget]` | Accept invitations and share links |
227
253
  | `clawdi agent projects list/attach/detach/move` | View the fixed Agent Project and manage attached Projects |
228
- | `clawdi project folder link/status/unlink` | Link a local folder to a Project for `clawdi run` vault selection |
229
- | `clawdi vault set/list/import` | Manage encrypted secrets |
230
- | `clawdi run -- <cmd>` | Run a command with vault secrets injected |
254
+ | `clawdi agent credentials import/materialize` | Sync local CLI credential profiles for Codex, Claude Code, and GitHub CLI; explicit Keychain import requires service/account options |
255
+ | `clawdi project folder link/status/unlink` | Link a local folder to a Project for vault reference selection |
256
+ | `clawdi vault set/list/import` | Manage encrypted secrets and copy exact references |
257
+ | `clawdi read <clawdi://...>` | Explicitly print one vault reference value |
258
+ | `clawdi inject --in <file> --out <file>` | Render `clawdi://` references into templates |
259
+ | `clawdi run --env-file <file> -- <cmd>` | Run a command with explicit vault references resolved |
231
260
  | `clawdi doctor` | Diagnose auth, agent paths, vault, and MCP config |
232
261
  | `clawdi update` | Check for a newer CLI version |
233
262
  | `clawdi mcp` | Start the MCP stdio server used by agents |