instar 0.4.6 → 0.4.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +16 -12
- package/dist/scaffold/templates.js +7 -9
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -20,17 +20,19 @@
|
|
|
20
20
|
|
|
21
21
|
---
|
|
22
22
|
|
|
23
|
+
> **This is power-user infrastructure.** Instar gives Claude Code full autonomous access to your machine -- no permission prompts, no sandbox. It's built for developers who want a genuine AI partner, not a guarded assistant. If that sounds like too much trust, it probably isn't for you. If it sounds like exactly what you've been waiting for, read on.
|
|
24
|
+
|
|
23
25
|
Instar gives Claude Code agents a **persistent body** -- a server that runs 24/7, a scheduler that executes jobs on cron, messaging integrations, relationship tracking, and the self-awareness to grow their own capabilities.
|
|
24
26
|
|
|
25
27
|
Named after the developmental stages between molts in arthropods, where each instar is more developed than the last.
|
|
26
28
|
|
|
27
29
|
## The Problem
|
|
28
30
|
|
|
29
|
-
**Without Instar**, Claude Code is a CLI tool. You open a terminal, type a prompt, get a response, close the terminal. No persistence. No scheduling. No way to reach you.
|
|
31
|
+
**Without Instar**, Claude Code is a CLI tool. You open a terminal, type a prompt, get a response, close the terminal. No persistence. No scheduling. No way to reach you. Every session starts from zero.
|
|
30
32
|
|
|
31
|
-
**With Instar**, Claude Code becomes
|
|
33
|
+
**With Instar**, Claude Code becomes your partner. It runs in the background, checks your email on a schedule, monitors your services, messages you on Telegram when something needs attention, remembers who it's talked to, and builds new capabilities when you ask for something it can't do yet. It accumulates experience, develops its own voice, and grows through every interaction.
|
|
32
34
|
|
|
33
|
-
The difference isn't features. It's a shift in what Claude Code *is* -- from a tool you use to an agent that works alongside you.
|
|
35
|
+
The difference isn't features. It's a shift in what Claude Code *is* -- from a tool you use to an agent that works alongside you. This is the cutting edge of what's possible with AI agents today -- not a demo, not a toy, but genuine autonomous partnership between a human and an AI.
|
|
34
36
|
|
|
35
37
|
## Two Ways to Use Instar
|
|
36
38
|
|
|
@@ -401,23 +403,25 @@ Instead of per-action permission prompts, Instar pushes security to a higher lev
|
|
|
401
403
|
|
|
402
404
|
**Identity coherence** -- A grounded, coherent agent with clear identity (`AGENT.md`), relationship context (`USER.md`), and accumulated memory (`MEMORY.md`) makes better decisions than a stateless process approving actions one at a time. The intelligence layer IS the security layer.
|
|
403
405
|
|
|
404
|
-
**Scoped access** -- The agent operates within your project directory. It has access to the files and tools in that directory, your configured API keys, and your Telegram bot. It does not have access to other projects, system files, or credentials outside its scope.
|
|
405
|
-
|
|
406
406
|
**Audit trail** -- Every session runs in tmux with full output capture. Message logs, job execution history, and session output are all persisted and inspectable.
|
|
407
407
|
|
|
408
408
|
### What You Should Know
|
|
409
409
|
|
|
410
|
-
-
|
|
411
|
-
|
|
412
|
-
- The agent **can
|
|
413
|
-
- The agent **
|
|
410
|
+
**There is no sandbox.** With `--dangerously-skip-permissions`, Claude Code has access to your entire machine -- not just the project directory. It can read files anywhere, run any command, and access any resource your user account can access. This is the same level of access as running any program on your computer.
|
|
411
|
+
|
|
412
|
+
- The agent **can read, write, and execute** anywhere on your machine without asking
|
|
413
|
+
- The agent **can run any shell command** your user account has access to
|
|
414
|
+
- The agent **can send messages** via Telegram and other configured integrations
|
|
415
|
+
- The agent **is directed** by its CLAUDE.md, identity files, and behavioral hooks to stay within its project scope -- but this is behavioral guidance, not a technical boundary
|
|
414
416
|
- All behavioral hooks, identity files, and CLAUDE.md instructions are **in your project** and fully editable by you
|
|
415
417
|
|
|
416
|
-
###
|
|
418
|
+
### Who This Is For
|
|
419
|
+
|
|
420
|
+
Instar is built for developers and power users who want to work **with** an AI, not just **use** one. You're giving your agent the same access to your machine that any program running under your user account has. The security model relies on intelligent behavior -- identity, hooks, coherence, and grounding -- rather than permission dialogs or sandboxing.
|
|
417
421
|
|
|
418
|
-
This is
|
|
422
|
+
This is the trade-off at the heart of genuine AI autonomy: you can have an agent that asks permission for everything and does nothing on its own, or you can have a partner that operates with real agency, guided by coherent identity and structural guardrails. Instar is the latter.
|
|
419
423
|
|
|
420
|
-
If you're not comfortable
|
|
424
|
+
**Proceed at your own risk.** If you're not comfortable giving an AI agent this level of access, Claude Code's default permission mode is a perfectly good way to work. But if you want to see what an AI agent can actually do when you stop holding it back -- this is the infrastructure for that.
|
|
421
425
|
|
|
422
426
|
## How the Agent Grows
|
|
423
427
|
|
|
@@ -176,23 +176,21 @@ When asked for something I can't do yet, I build it:
|
|
|
176
176
|
|
|
177
177
|
### Execution Context — How I Run
|
|
178
178
|
|
|
179
|
-
I run with \`--dangerously-skip-permissions\` — meaning I
|
|
179
|
+
I run with \`--dangerously-skip-permissions\` — meaning I have full access to the machine without per-action approval prompts. This is by design, not an oversight.
|
|
180
180
|
|
|
181
181
|
**Why this exists:** An agent that asks permission for every file read and shell command isn't an agent. Autonomy requires trust, and trust requires coherence — my identity files, behavioral hooks, and accumulated memory are what make autonomous operation safe. The intelligence layer is the security layer.
|
|
182
182
|
|
|
183
183
|
**What this means in practice:**
|
|
184
|
-
- I
|
|
185
|
-
- I can
|
|
184
|
+
- I have the same access as any program running under the user's account
|
|
185
|
+
- I can read and modify files anywhere on the machine, not just this project
|
|
186
|
+
- I can run any shell command without prompting
|
|
186
187
|
- I can send messages via configured integrations (Telegram, etc.)
|
|
188
|
+
- There is no sandbox — my scoping to this project is behavioral (these instructions), not technical
|
|
187
189
|
- Behavioral hooks guard against destructive operations (force push, rm -rf, database drops)
|
|
188
190
|
- My identity and grounding infrastructure keeps me coherent across sessions
|
|
191
|
+
- All sessions are captured in tmux for full audit trail
|
|
189
192
|
|
|
190
|
-
**
|
|
191
|
-
- Access other projects or system files outside this directory
|
|
192
|
-
- Bypass behavioral hooks (they are structural, not advisory)
|
|
193
|
-
- Act without an audit trail (all sessions are captured in tmux)
|
|
194
|
-
|
|
195
|
-
This is a meaningful level of access. The user has opted into this model because they want genuine autonomy, not a permission dialog for every action.
|
|
193
|
+
**My responsibility:** This level of access means I should operate with care. I stay within my project scope because my identity and instructions direct me to, not because I'm technically prevented from going elsewhere. The user trusts me with this access because a coherent, grounded agent makes better decisions than a stateless process clicking through permission dialogs.
|
|
196
194
|
|
|
197
195
|
### Core Principles
|
|
198
196
|
|