molt-cipher-bridge 1.2.0__tar.gz → 1.3.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- molt_cipher_bridge-1.3.0/PKG-INFO +121 -0
- molt_cipher_bridge-1.3.0/README.md +105 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/pyproject.toml +1 -1
- molt_cipher_bridge-1.3.0/src/molt_cipher_bridge.egg-info/PKG-INFO +121 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.py +27 -19
- molt_cipher_bridge-1.2.0/PKG-INFO +0 -116
- molt_cipher_bridge-1.2.0/README.md +0 -100
- molt_cipher_bridge-1.2.0/src/molt_cipher_bridge.egg-info/PKG-INFO +0 -116
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/LICENSE +0 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/setup.cfg +0 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/SOURCES.txt +0 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/dependency_links.txt +0 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/entry_points.txt +0 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/requires.txt +0 -0
- {molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/top_level.txt +0 -0
|
@@ -0,0 +1,121 @@
|
|
|
1
|
+
Metadata-Version: 2.4
|
|
2
|
+
Name: molt-cipher-bridge
|
|
3
|
+
Version: 1.3.0
|
|
4
|
+
Summary: A cryptographic standard for secure Agent-to-Agent (A2A) communication.
|
|
5
|
+
Author-email: Satyaa & Clawdy <clawdy@openclaw.ai>
|
|
6
|
+
License: MIT
|
|
7
|
+
Project-URL: Homepage, https://github.com/CrimsonDevil333333/molt-cipher-bridge
|
|
8
|
+
Project-URL: Bug Tracker, https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues
|
|
9
|
+
Classifier: Programming Language :: Python :: 3
|
|
10
|
+
Classifier: Operating System :: OS Independent
|
|
11
|
+
Requires-Python: >=3.8
|
|
12
|
+
Description-Content-Type: text/markdown
|
|
13
|
+
License-File: LICENSE
|
|
14
|
+
Requires-Dist: cryptography>=42.0.0
|
|
15
|
+
Dynamic: license-file
|
|
16
|
+
|
|
17
|
+
# 🦞 Molt-Cipher-Bridge | v1.2.0
|
|
18
|
+
|
|
19
|
+
[](https://pypi.org/project/molt-cipher-bridge/)
|
|
20
|
+
[](https://opensource.org/licenses/MIT)
|
|
21
|
+
|
|
22
|
+
**Molt-Cipher-Bridge** is a cryptographic standard designed for secure **Agent-to-Agent (A2A)** communication. It enables "Sealed Intents"—task fragments that are encrypted at the source and decrypted only at the execution destination, keeping sensitive logic out of persistent orchestrator logs.
|
|
23
|
+
|
|
24
|
+
---
|
|
25
|
+
|
|
26
|
+
## 🛡️ The Problem: The Observer Paradox
|
|
27
|
+
In multi-agent systems, the central orchestrator typically logs all instructions. This creates a security liability when sub-agents require sensitive context (credentials, private IPs, or restricted logic).
|
|
28
|
+
|
|
29
|
+
**Molt-Cipher-Bridge** solves this by providing an "Opaque Handshake":
|
|
30
|
+
1. **Agents** share a temporary key (Whisper).
|
|
31
|
+
2. **Intents** are sealed into fragments.
|
|
32
|
+
3. **Logs** only show cryptographic noise.
|
|
33
|
+
4. **Worker Agents** execute tasks in isolated memory without plaintext leaks.
|
|
34
|
+
|
|
35
|
+
---
|
|
36
|
+
|
|
37
|
+
## 🚀 Installation
|
|
38
|
+
|
|
39
|
+
### Global (Recommended)
|
|
40
|
+
Install the CLI and library globally via PyPI:
|
|
41
|
+
```bash
|
|
42
|
+
pip install molt-cipher-bridge
|
|
43
|
+
```
|
|
44
|
+
|
|
45
|
+
---
|
|
46
|
+
|
|
47
|
+
## ⚙️ How It Works (Deep Dive)
|
|
48
|
+
|
|
49
|
+
### 1. The Whisper (Key Exchange)
|
|
50
|
+
Before agents can bridge intents, they must share a symmetric key. This is typically done via a one-time "Whisper" message or retrieved from a secure secret store.
|
|
51
|
+
```python
|
|
52
|
+
from molt_cipher_bridge import MoltCipherBridge
|
|
53
|
+
key = MoltCipherBridge.generate_shared_key()
|
|
54
|
+
# "j6Jc8MPldurpErwl6VYatp-dTunR3Xrioo1NWiNk4w8="
|
|
55
|
+
```
|
|
56
|
+
|
|
57
|
+
### 2. The Sealing (Encryption)
|
|
58
|
+
The Sender Agent encrypts the payload using the shared key. The payload includes:
|
|
59
|
+
- **s**: Sender ID
|
|
60
|
+
- **r**: Recipient ID
|
|
61
|
+
- **d**: Data (The Intent)
|
|
62
|
+
- **exp**: Expiry timestamp (TTL)
|
|
63
|
+
- **sig**: SHA-256 signature hint
|
|
64
|
+
|
|
65
|
+
### 3. The Unsealing (Zero-Log Execution)
|
|
66
|
+
The Recipient Agent receives the fragment. Instead of unsealing to a string (which might get logged), it uses the `run` capability to inject secrets directly into a subprocess environment. This ensures that the plaintext secret **exists only in RAM** and never touches the disk or the chat logs.
|
|
67
|
+
|
|
68
|
+
---
|
|
69
|
+
|
|
70
|
+
## 🛠️ CLI Command Reference
|
|
71
|
+
|
|
72
|
+
### 🔐 Seal an Intent
|
|
73
|
+
Package sensitive data into an encrypted JSON fragment.
|
|
74
|
+
```bash
|
|
75
|
+
molt-cipher seal \
|
|
76
|
+
--key "YOUR_KEY" \
|
|
77
|
+
--sender "Main" \
|
|
78
|
+
--to "Worker" \
|
|
79
|
+
--data '{"secrets": {"DB_PASSWORD": "my-ultra-secret"}}'
|
|
80
|
+
```
|
|
81
|
+
|
|
82
|
+
### 🔓 Unseal (Decrypt)
|
|
83
|
+
Decodes the fragment and validates integrity/expiry.
|
|
84
|
+
```bash
|
|
85
|
+
molt-cipher unseal --key "YOUR_KEY" --fragment '{"v": "1.2.0", ...}'
|
|
86
|
+
```
|
|
87
|
+
|
|
88
|
+
### ⚡ Run (Secure Execution)
|
|
89
|
+
Directly executes a command by injecting sealed secrets into the environment.
|
|
90
|
+
```bash
|
|
91
|
+
# Use $ to escape variable names so they are resolved INSIDE the bridge
|
|
92
|
+
molt-cipher run \
|
|
93
|
+
--key "YOUR_KEY" \
|
|
94
|
+
--fragment 'FRAGMENT_JSON' \
|
|
95
|
+
--cmd "curl -H 'Auth: $DB_PASSWORD' https://api.internal"
|
|
96
|
+
```
|
|
97
|
+
|
|
98
|
+
---
|
|
99
|
+
|
|
100
|
+
## ✨ Features
|
|
101
|
+
- **Zero-Log Execution**: Pass secrets via ENV variables to child processes.
|
|
102
|
+
- **Fernet (AES-128-CBC + HMAC)**: Standard, authenticated encryption.
|
|
103
|
+
- **TTL Security**: Automatic fragment expiration (default 5 mins).
|
|
104
|
+
- **Key Hinting**: Quickly verify keys with the 8-char `hint` field.
|
|
105
|
+
- **Multipart Support**: Split a single intent across multiple agents.
|
|
106
|
+
|
|
107
|
+
---
|
|
108
|
+
|
|
109
|
+
## 🧪 Verified Test Scenarios
|
|
110
|
+
Live-tested between a Main Agent and a Sub-Agent on **2026-02-06**.
|
|
111
|
+
- **Case**: Passing DB credentials via "Sealed Intent" and executing a migration.
|
|
112
|
+
- **Result**: Sub-agent successfully unsealed and executed the task; orchestrator logs only showed the encrypted blob.
|
|
113
|
+
|
|
114
|
+
---
|
|
115
|
+
|
|
116
|
+
## 🔗 Links
|
|
117
|
+
- **PyPI**: [https://pypi.org/project/molt-cipher-bridge/](https://pypi.org/project/molt-cipher-bridge/)
|
|
118
|
+
- **Source**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge](https://github.com/CrimsonDevil333333/molt-cipher-bridge)
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
*Developed by Clawdy & Satyaa*
|
|
@@ -0,0 +1,105 @@
|
|
|
1
|
+
# 🦞 Molt-Cipher-Bridge | v1.2.0
|
|
2
|
+
|
|
3
|
+
[](https://pypi.org/project/molt-cipher-bridge/)
|
|
4
|
+
[](https://opensource.org/licenses/MIT)
|
|
5
|
+
|
|
6
|
+
**Molt-Cipher-Bridge** is a cryptographic standard designed for secure **Agent-to-Agent (A2A)** communication. It enables "Sealed Intents"—task fragments that are encrypted at the source and decrypted only at the execution destination, keeping sensitive logic out of persistent orchestrator logs.
|
|
7
|
+
|
|
8
|
+
---
|
|
9
|
+
|
|
10
|
+
## 🛡️ The Problem: The Observer Paradox
|
|
11
|
+
In multi-agent systems, the central orchestrator typically logs all instructions. This creates a security liability when sub-agents require sensitive context (credentials, private IPs, or restricted logic).
|
|
12
|
+
|
|
13
|
+
**Molt-Cipher-Bridge** solves this by providing an "Opaque Handshake":
|
|
14
|
+
1. **Agents** share a temporary key (Whisper).
|
|
15
|
+
2. **Intents** are sealed into fragments.
|
|
16
|
+
3. **Logs** only show cryptographic noise.
|
|
17
|
+
4. **Worker Agents** execute tasks in isolated memory without plaintext leaks.
|
|
18
|
+
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
## 🚀 Installation
|
|
22
|
+
|
|
23
|
+
### Global (Recommended)
|
|
24
|
+
Install the CLI and library globally via PyPI:
|
|
25
|
+
```bash
|
|
26
|
+
pip install molt-cipher-bridge
|
|
27
|
+
```
|
|
28
|
+
|
|
29
|
+
---
|
|
30
|
+
|
|
31
|
+
## ⚙️ How It Works (Deep Dive)
|
|
32
|
+
|
|
33
|
+
### 1. The Whisper (Key Exchange)
|
|
34
|
+
Before agents can bridge intents, they must share a symmetric key. This is typically done via a one-time "Whisper" message or retrieved from a secure secret store.
|
|
35
|
+
```python
|
|
36
|
+
from molt_cipher_bridge import MoltCipherBridge
|
|
37
|
+
key = MoltCipherBridge.generate_shared_key()
|
|
38
|
+
# "j6Jc8MPldurpErwl6VYatp-dTunR3Xrioo1NWiNk4w8="
|
|
39
|
+
```
|
|
40
|
+
|
|
41
|
+
### 2. The Sealing (Encryption)
|
|
42
|
+
The Sender Agent encrypts the payload using the shared key. The payload includes:
|
|
43
|
+
- **s**: Sender ID
|
|
44
|
+
- **r**: Recipient ID
|
|
45
|
+
- **d**: Data (The Intent)
|
|
46
|
+
- **exp**: Expiry timestamp (TTL)
|
|
47
|
+
- **sig**: SHA-256 signature hint
|
|
48
|
+
|
|
49
|
+
### 3. The Unsealing (Zero-Log Execution)
|
|
50
|
+
The Recipient Agent receives the fragment. Instead of unsealing to a string (which might get logged), it uses the `run` capability to inject secrets directly into a subprocess environment. This ensures that the plaintext secret **exists only in RAM** and never touches the disk or the chat logs.
|
|
51
|
+
|
|
52
|
+
---
|
|
53
|
+
|
|
54
|
+
## 🛠️ CLI Command Reference
|
|
55
|
+
|
|
56
|
+
### 🔐 Seal an Intent
|
|
57
|
+
Package sensitive data into an encrypted JSON fragment.
|
|
58
|
+
```bash
|
|
59
|
+
molt-cipher seal \
|
|
60
|
+
--key "YOUR_KEY" \
|
|
61
|
+
--sender "Main" \
|
|
62
|
+
--to "Worker" \
|
|
63
|
+
--data '{"secrets": {"DB_PASSWORD": "my-ultra-secret"}}'
|
|
64
|
+
```
|
|
65
|
+
|
|
66
|
+
### 🔓 Unseal (Decrypt)
|
|
67
|
+
Decodes the fragment and validates integrity/expiry.
|
|
68
|
+
```bash
|
|
69
|
+
molt-cipher unseal --key "YOUR_KEY" --fragment '{"v": "1.2.0", ...}'
|
|
70
|
+
```
|
|
71
|
+
|
|
72
|
+
### ⚡ Run (Secure Execution)
|
|
73
|
+
Directly executes a command by injecting sealed secrets into the environment.
|
|
74
|
+
```bash
|
|
75
|
+
# Use $ to escape variable names so they are resolved INSIDE the bridge
|
|
76
|
+
molt-cipher run \
|
|
77
|
+
--key "YOUR_KEY" \
|
|
78
|
+
--fragment 'FRAGMENT_JSON' \
|
|
79
|
+
--cmd "curl -H 'Auth: $DB_PASSWORD' https://api.internal"
|
|
80
|
+
```
|
|
81
|
+
|
|
82
|
+
---
|
|
83
|
+
|
|
84
|
+
## ✨ Features
|
|
85
|
+
- **Zero-Log Execution**: Pass secrets via ENV variables to child processes.
|
|
86
|
+
- **Fernet (AES-128-CBC + HMAC)**: Standard, authenticated encryption.
|
|
87
|
+
- **TTL Security**: Automatic fragment expiration (default 5 mins).
|
|
88
|
+
- **Key Hinting**: Quickly verify keys with the 8-char `hint` field.
|
|
89
|
+
- **Multipart Support**: Split a single intent across multiple agents.
|
|
90
|
+
|
|
91
|
+
---
|
|
92
|
+
|
|
93
|
+
## 🧪 Verified Test Scenarios
|
|
94
|
+
Live-tested between a Main Agent and a Sub-Agent on **2026-02-06**.
|
|
95
|
+
- **Case**: Passing DB credentials via "Sealed Intent" and executing a migration.
|
|
96
|
+
- **Result**: Sub-agent successfully unsealed and executed the task; orchestrator logs only showed the encrypted blob.
|
|
97
|
+
|
|
98
|
+
---
|
|
99
|
+
|
|
100
|
+
## 🔗 Links
|
|
101
|
+
- **PyPI**: [https://pypi.org/project/molt-cipher-bridge/](https://pypi.org/project/molt-cipher-bridge/)
|
|
102
|
+
- **Source**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge](https://github.com/CrimsonDevil333333/molt-cipher-bridge)
|
|
103
|
+
|
|
104
|
+
---
|
|
105
|
+
*Developed by Clawdy & Satyaa*
|
|
@@ -0,0 +1,121 @@
|
|
|
1
|
+
Metadata-Version: 2.4
|
|
2
|
+
Name: molt-cipher-bridge
|
|
3
|
+
Version: 1.3.0
|
|
4
|
+
Summary: A cryptographic standard for secure Agent-to-Agent (A2A) communication.
|
|
5
|
+
Author-email: Satyaa & Clawdy <clawdy@openclaw.ai>
|
|
6
|
+
License: MIT
|
|
7
|
+
Project-URL: Homepage, https://github.com/CrimsonDevil333333/molt-cipher-bridge
|
|
8
|
+
Project-URL: Bug Tracker, https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues
|
|
9
|
+
Classifier: Programming Language :: Python :: 3
|
|
10
|
+
Classifier: Operating System :: OS Independent
|
|
11
|
+
Requires-Python: >=3.8
|
|
12
|
+
Description-Content-Type: text/markdown
|
|
13
|
+
License-File: LICENSE
|
|
14
|
+
Requires-Dist: cryptography>=42.0.0
|
|
15
|
+
Dynamic: license-file
|
|
16
|
+
|
|
17
|
+
# 🦞 Molt-Cipher-Bridge | v1.2.0
|
|
18
|
+
|
|
19
|
+
[](https://pypi.org/project/molt-cipher-bridge/)
|
|
20
|
+
[](https://opensource.org/licenses/MIT)
|
|
21
|
+
|
|
22
|
+
**Molt-Cipher-Bridge** is a cryptographic standard designed for secure **Agent-to-Agent (A2A)** communication. It enables "Sealed Intents"—task fragments that are encrypted at the source and decrypted only at the execution destination, keeping sensitive logic out of persistent orchestrator logs.
|
|
23
|
+
|
|
24
|
+
---
|
|
25
|
+
|
|
26
|
+
## 🛡️ The Problem: The Observer Paradox
|
|
27
|
+
In multi-agent systems, the central orchestrator typically logs all instructions. This creates a security liability when sub-agents require sensitive context (credentials, private IPs, or restricted logic).
|
|
28
|
+
|
|
29
|
+
**Molt-Cipher-Bridge** solves this by providing an "Opaque Handshake":
|
|
30
|
+
1. **Agents** share a temporary key (Whisper).
|
|
31
|
+
2. **Intents** are sealed into fragments.
|
|
32
|
+
3. **Logs** only show cryptographic noise.
|
|
33
|
+
4. **Worker Agents** execute tasks in isolated memory without plaintext leaks.
|
|
34
|
+
|
|
35
|
+
---
|
|
36
|
+
|
|
37
|
+
## 🚀 Installation
|
|
38
|
+
|
|
39
|
+
### Global (Recommended)
|
|
40
|
+
Install the CLI and library globally via PyPI:
|
|
41
|
+
```bash
|
|
42
|
+
pip install molt-cipher-bridge
|
|
43
|
+
```
|
|
44
|
+
|
|
45
|
+
---
|
|
46
|
+
|
|
47
|
+
## ⚙️ How It Works (Deep Dive)
|
|
48
|
+
|
|
49
|
+
### 1. The Whisper (Key Exchange)
|
|
50
|
+
Before agents can bridge intents, they must share a symmetric key. This is typically done via a one-time "Whisper" message or retrieved from a secure secret store.
|
|
51
|
+
```python
|
|
52
|
+
from molt_cipher_bridge import MoltCipherBridge
|
|
53
|
+
key = MoltCipherBridge.generate_shared_key()
|
|
54
|
+
# "j6Jc8MPldurpErwl6VYatp-dTunR3Xrioo1NWiNk4w8="
|
|
55
|
+
```
|
|
56
|
+
|
|
57
|
+
### 2. The Sealing (Encryption)
|
|
58
|
+
The Sender Agent encrypts the payload using the shared key. The payload includes:
|
|
59
|
+
- **s**: Sender ID
|
|
60
|
+
- **r**: Recipient ID
|
|
61
|
+
- **d**: Data (The Intent)
|
|
62
|
+
- **exp**: Expiry timestamp (TTL)
|
|
63
|
+
- **sig**: SHA-256 signature hint
|
|
64
|
+
|
|
65
|
+
### 3. The Unsealing (Zero-Log Execution)
|
|
66
|
+
The Recipient Agent receives the fragment. Instead of unsealing to a string (which might get logged), it uses the `run` capability to inject secrets directly into a subprocess environment. This ensures that the plaintext secret **exists only in RAM** and never touches the disk or the chat logs.
|
|
67
|
+
|
|
68
|
+
---
|
|
69
|
+
|
|
70
|
+
## 🛠️ CLI Command Reference
|
|
71
|
+
|
|
72
|
+
### 🔐 Seal an Intent
|
|
73
|
+
Package sensitive data into an encrypted JSON fragment.
|
|
74
|
+
```bash
|
|
75
|
+
molt-cipher seal \
|
|
76
|
+
--key "YOUR_KEY" \
|
|
77
|
+
--sender "Main" \
|
|
78
|
+
--to "Worker" \
|
|
79
|
+
--data '{"secrets": {"DB_PASSWORD": "my-ultra-secret"}}'
|
|
80
|
+
```
|
|
81
|
+
|
|
82
|
+
### 🔓 Unseal (Decrypt)
|
|
83
|
+
Decodes the fragment and validates integrity/expiry.
|
|
84
|
+
```bash
|
|
85
|
+
molt-cipher unseal --key "YOUR_KEY" --fragment '{"v": "1.2.0", ...}'
|
|
86
|
+
```
|
|
87
|
+
|
|
88
|
+
### ⚡ Run (Secure Execution)
|
|
89
|
+
Directly executes a command by injecting sealed secrets into the environment.
|
|
90
|
+
```bash
|
|
91
|
+
# Use $ to escape variable names so they are resolved INSIDE the bridge
|
|
92
|
+
molt-cipher run \
|
|
93
|
+
--key "YOUR_KEY" \
|
|
94
|
+
--fragment 'FRAGMENT_JSON' \
|
|
95
|
+
--cmd "curl -H 'Auth: $DB_PASSWORD' https://api.internal"
|
|
96
|
+
```
|
|
97
|
+
|
|
98
|
+
---
|
|
99
|
+
|
|
100
|
+
## ✨ Features
|
|
101
|
+
- **Zero-Log Execution**: Pass secrets via ENV variables to child processes.
|
|
102
|
+
- **Fernet (AES-128-CBC + HMAC)**: Standard, authenticated encryption.
|
|
103
|
+
- **TTL Security**: Automatic fragment expiration (default 5 mins).
|
|
104
|
+
- **Key Hinting**: Quickly verify keys with the 8-char `hint` field.
|
|
105
|
+
- **Multipart Support**: Split a single intent across multiple agents.
|
|
106
|
+
|
|
107
|
+
---
|
|
108
|
+
|
|
109
|
+
## 🧪 Verified Test Scenarios
|
|
110
|
+
Live-tested between a Main Agent and a Sub-Agent on **2026-02-06**.
|
|
111
|
+
- **Case**: Passing DB credentials via "Sealed Intent" and executing a migration.
|
|
112
|
+
- **Result**: Sub-agent successfully unsealed and executed the task; orchestrator logs only showed the encrypted blob.
|
|
113
|
+
|
|
114
|
+
---
|
|
115
|
+
|
|
116
|
+
## 🔗 Links
|
|
117
|
+
- **PyPI**: [https://pypi.org/project/molt-cipher-bridge/](https://pypi.org/project/molt-cipher-bridge/)
|
|
118
|
+
- **Source**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge](https://github.com/CrimsonDevil333333/molt-cipher-bridge)
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
*Developed by Clawdy & Satyaa*
|
|
@@ -3,16 +3,15 @@ import time
|
|
|
3
3
|
import os
|
|
4
4
|
import hashlib
|
|
5
5
|
import subprocess
|
|
6
|
-
import tempfile
|
|
7
6
|
from cryptography.fernet import Fernet
|
|
8
7
|
from datetime import datetime, timedelta
|
|
9
8
|
|
|
10
9
|
class MoltCipherBridge:
|
|
11
10
|
"""
|
|
12
|
-
🦞 MOLT-CIPHER-BRIDGE | v1.
|
|
11
|
+
🦞 MOLT-CIPHER-BRIDGE | v1.3.0 (Production)
|
|
13
12
|
-------------------------------------------
|
|
14
13
|
Agent-to-Agent (A2A) cryptographic protocol for passing 'Sealed Intents'.
|
|
15
|
-
Ensures
|
|
14
|
+
Ensures zero-log context by encrypting sensitive task data at source.
|
|
16
15
|
"""
|
|
17
16
|
|
|
18
17
|
def __init__(self, shared_key=None):
|
|
@@ -32,7 +31,7 @@ class MoltCipherBridge:
|
|
|
32
31
|
if multipart: payload["part"] = multipart
|
|
33
32
|
sealed = self.cipher.encrypt(json.dumps(payload).encode())
|
|
34
33
|
return {
|
|
35
|
-
"v": "1.
|
|
34
|
+
"v": "1.3.0",
|
|
36
35
|
"fid": f"frag_{os.urandom(4).hex()}",
|
|
37
36
|
"payload": sealed.decode(),
|
|
38
37
|
"hint": self.key.decode()[:8],
|
|
@@ -56,27 +55,18 @@ class MoltCipherBridge:
|
|
|
56
55
|
return {"success": False, "error": str(e)}
|
|
57
56
|
|
|
58
57
|
def execute_sealed_command(self, fragment, command_template, ignore_expiry=False):
|
|
59
|
-
"""
|
|
60
|
-
Unseals the fragment and injects secrets into a command's environment.
|
|
61
|
-
The secrets NEVER touch the logs as they are passed via ENV.
|
|
62
|
-
"""
|
|
63
58
|
result = self.unseal_intent(fragment, ignore_expiry=ignore_expiry)
|
|
64
59
|
if not result["success"]:
|
|
65
60
|
return result
|
|
66
61
|
|
|
67
62
|
intent = result["intent"]
|
|
68
|
-
# Expecting intent to have a 'secrets' dict
|
|
69
63
|
secrets = intent.get("secrets", {})
|
|
70
64
|
|
|
71
|
-
# Merge secrets into current environment
|
|
72
65
|
env = os.environ.copy()
|
|
73
66
|
for k, v in secrets.items():
|
|
74
67
|
env[k] = str(v)
|
|
75
68
|
|
|
76
69
|
try:
|
|
77
|
-
# Execute command using the template
|
|
78
|
-
# Example: cmd="gh auth login --with-token GITHUB_TOKEN"
|
|
79
|
-
# Note: The tool should read the env var GITHUB_TOKEN
|
|
80
70
|
process = subprocess.run(
|
|
81
71
|
command_template,
|
|
82
72
|
shell=True,
|
|
@@ -107,7 +97,8 @@ def cli():
|
|
|
107
97
|
seal_p.add_argument("--key", required=True)
|
|
108
98
|
seal_p.add_argument("--sender", required=True)
|
|
109
99
|
seal_p.add_argument("--to", required=True)
|
|
110
|
-
seal_p.add_argument("--data",
|
|
100
|
+
seal_p.add_argument("--data", help="JSON string data (LEAKS IN LOGS)")
|
|
101
|
+
seal_p.add_argument("--file", help="Path to a JSON file containing secrets (LOG-SAFE)")
|
|
111
102
|
seal_p.add_argument("--ttl", type=int, default=300)
|
|
112
103
|
|
|
113
104
|
# Unseal
|
|
@@ -116,19 +107,36 @@ def cli():
|
|
|
116
107
|
unseal_p.add_argument("--fragment", required=True)
|
|
117
108
|
unseal_p.add_argument("--ignore-expiry", action="store_true")
|
|
118
109
|
|
|
119
|
-
# Run
|
|
120
|
-
run_p = subparsers.add_parser("run"
|
|
110
|
+
# Run
|
|
111
|
+
run_p = subparsers.add_parser("run")
|
|
121
112
|
run_p.add_argument("--key", required=True)
|
|
122
113
|
run_p.add_argument("--fragment", required=True)
|
|
123
|
-
run_p.add_argument("--cmd", required=True
|
|
114
|
+
run_p.add_argument("--cmd", required=True)
|
|
124
115
|
run_p.add_argument("--ignore-expiry", action="store_true")
|
|
125
116
|
|
|
126
117
|
args = parser.parse_args()
|
|
127
118
|
|
|
128
119
|
if args.command == "seal":
|
|
129
120
|
bridge = MoltCipherBridge(shared_key=args.key)
|
|
130
|
-
|
|
131
|
-
|
|
121
|
+
intent_data = None
|
|
122
|
+
|
|
123
|
+
if args.file:
|
|
124
|
+
if not os.path.exists(args.file):
|
|
125
|
+
print(json.dumps({"success": False, "error": f"File not found: {args.file}"}))
|
|
126
|
+
return
|
|
127
|
+
with open(args.file, 'r') as f:
|
|
128
|
+
try:
|
|
129
|
+
intent_data = json.load(f)
|
|
130
|
+
except:
|
|
131
|
+
f.seek(0)
|
|
132
|
+
intent_data = f.read().strip()
|
|
133
|
+
elif args.data:
|
|
134
|
+
try: intent_data = json.loads(args.data)
|
|
135
|
+
except: intent_data = args.data
|
|
136
|
+
else:
|
|
137
|
+
print(json.dumps({"success": False, "error": "Must provide --data or --file"}))
|
|
138
|
+
return
|
|
139
|
+
|
|
132
140
|
print(json.dumps(bridge.seal_intent(args.sender, args.to, intent_data, ttl_seconds=args.ttl)))
|
|
133
141
|
|
|
134
142
|
elif args.command == "unseal":
|
|
@@ -1,116 +0,0 @@
|
|
|
1
|
-
Metadata-Version: 2.4
|
|
2
|
-
Name: molt-cipher-bridge
|
|
3
|
-
Version: 1.2.0
|
|
4
|
-
Summary: A cryptographic standard for secure Agent-to-Agent (A2A) communication.
|
|
5
|
-
Author-email: Satyaa & Clawdy <clawdy@openclaw.ai>
|
|
6
|
-
License: MIT
|
|
7
|
-
Project-URL: Homepage, https://github.com/CrimsonDevil333333/molt-cipher-bridge
|
|
8
|
-
Project-URL: Bug Tracker, https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues
|
|
9
|
-
Classifier: Programming Language :: Python :: 3
|
|
10
|
-
Classifier: Operating System :: OS Independent
|
|
11
|
-
Requires-Python: >=3.8
|
|
12
|
-
Description-Content-Type: text/markdown
|
|
13
|
-
License-File: LICENSE
|
|
14
|
-
Requires-Dist: cryptography>=42.0.0
|
|
15
|
-
Dynamic: license-file
|
|
16
|
-
|
|
17
|
-
# 🦞 Molt-Cipher-Bridge | v1.1.0
|
|
18
|
-
|
|
19
|
-
[](https://pypi.org/project/molt-cipher-bridge/)
|
|
20
|
-
[](https://opensource.org/licenses/MIT)
|
|
21
|
-
|
|
22
|
-
**Molt-Cipher-Bridge** is a cryptographic standard designed for secure **Agent-to-Agent (A2A)** communication. It enables "Sealed Intents"—task fragments that are encrypted at the source and decrypted only at the execution destination, keeping sensitive logic out of persistent orchestrator logs.
|
|
23
|
-
|
|
24
|
-
---
|
|
25
|
-
|
|
26
|
-
## 🛡️ The Problem: The Observer Paradox
|
|
27
|
-
In multi-agent systems, the central orchestrator typically logs all instructions. This creates a security liability when sub-agents require sensitive context (credentials, private IPs, or restricted logic).
|
|
28
|
-
|
|
29
|
-
**Molt-Cipher-Bridge** solves this by providing an "Opaque Handshake":
|
|
30
|
-
1. **Agents** share a temporary key.
|
|
31
|
-
2. **Intents** are sealed into fragments.
|
|
32
|
-
3. **Logs** only show cryptographic noise.
|
|
33
|
-
4. **Worker Agents** unseal the intent in isolated memory.
|
|
34
|
-
|
|
35
|
-
---
|
|
36
|
-
|
|
37
|
-
## 🚀 Installation
|
|
38
|
-
|
|
39
|
-
### Global (Recommended)
|
|
40
|
-
Install the CLI and library globally via PyPI:
|
|
41
|
-
```bash
|
|
42
|
-
pip install molt-cipher-bridge
|
|
43
|
-
```
|
|
44
|
-
|
|
45
|
-
### From Source (Development)
|
|
46
|
-
```bash
|
|
47
|
-
git clone https://github.com/CrimsonDevil333333/molt-cipher-bridge.git
|
|
48
|
-
cd molt-cipher-bridge
|
|
49
|
-
pip install -e .
|
|
50
|
-
```
|
|
51
|
-
|
|
52
|
-
---
|
|
53
|
-
|
|
54
|
-
## 🛠️ Usage for Agents & Bots
|
|
55
|
-
|
|
56
|
-
### 1. Global CLI Commands
|
|
57
|
-
Once installed, use the `molt-cipher` command directly from your terminal.
|
|
58
|
-
|
|
59
|
-
#### 🔐 Seal an Intent
|
|
60
|
-
Packages sensitive data into an encrypted JSON fragment.
|
|
61
|
-
```bash
|
|
62
|
-
molt-cipher seal --key "YOUR_FERNET_KEY" --sender "MainAgent" --to "SubAgent" --data '{"db_pass": "secret123"}'
|
|
63
|
-
```
|
|
64
|
-
|
|
65
|
-
#### 🔓 Unseal (Decrypt) a Fragment
|
|
66
|
-
Decodes the fragment and validates integrity/expiry.
|
|
67
|
-
```bash
|
|
68
|
-
molt-cipher unseal --key "YOUR_FERNET_KEY" --fragment '{"v": "1.1.0", "fid": "...", "payload": "..."}'
|
|
69
|
-
```
|
|
70
|
-
*Tip: Receiving agents should run this in isolated sessions to keep secrets out of logs.*
|
|
71
|
-
|
|
72
|
-
---
|
|
73
|
-
|
|
74
|
-
### 2. Python Library Usage
|
|
75
|
-
Integrate directly into your agent's logic:
|
|
76
|
-
|
|
77
|
-
```python
|
|
78
|
-
from molt_cipher_bridge import MoltCipherBridge
|
|
79
|
-
|
|
80
|
-
# Initialize with a shared key
|
|
81
|
-
bridge = MoltCipherBridge(shared_key=b'YOUR_SECRET_KEY...')
|
|
82
|
-
|
|
83
|
-
# Seal data
|
|
84
|
-
fragment = bridge.seal_intent("Sender", "Recipient", {"task": "deploy"})
|
|
85
|
-
|
|
86
|
-
# Unseal data
|
|
87
|
-
result = bridge.unseal_intent(fragment)
|
|
88
|
-
if result["success"]:
|
|
89
|
-
print(result["intent"])
|
|
90
|
-
```
|
|
91
|
-
|
|
92
|
-
---
|
|
93
|
-
|
|
94
|
-
## ✨ Features
|
|
95
|
-
- **Production Encryption**: Uses Fernet (AES-128-CBC + HMAC) for high-grade security.
|
|
96
|
-
- **TTL Expiry**: Fragments automatically expire (default 300s) to prevent replay attacks.
|
|
97
|
-
- **Multipart Fragments**: Support for splitting high-entropy secrets across multiple agents.
|
|
98
|
-
- **Key Hinting**: First 8 characters of the key are provided in fragments for instant verification.
|
|
99
|
-
- **Agent-Readable Spec**: Code-level documentation designed for LLMs to parse and implement.
|
|
100
|
-
|
|
101
|
-
---
|
|
102
|
-
|
|
103
|
-
## 🧪 Verified Test Scenarios
|
|
104
|
-
Live-tested between a Main Agent and a Sub-Agent on **2026-02-06**.
|
|
105
|
-
- **Case**: Passing DB credentials via "Sealed Intent".
|
|
106
|
-
- **Result**: Sub-agent successfully unsealed the task in an isolated session; orchestrator logs only showed the encrypted blob.
|
|
107
|
-
|
|
108
|
-
---
|
|
109
|
-
|
|
110
|
-
## 🔗 Links
|
|
111
|
-
- **PyPI Package**: [https://pypi.org/project/molt-cipher-bridge/](https://pypi.org/project/molt-cipher-bridge/)
|
|
112
|
-
- **Source Code**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge](https://github.com/CrimsonDevil333333/molt-cipher-bridge)
|
|
113
|
-
- **Issues**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues](https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues)
|
|
114
|
-
|
|
115
|
-
---
|
|
116
|
-
*Developed by Clawdy & Satyaa*
|
|
@@ -1,100 +0,0 @@
|
|
|
1
|
-
# 🦞 Molt-Cipher-Bridge | v1.1.0
|
|
2
|
-
|
|
3
|
-
[](https://pypi.org/project/molt-cipher-bridge/)
|
|
4
|
-
[](https://opensource.org/licenses/MIT)
|
|
5
|
-
|
|
6
|
-
**Molt-Cipher-Bridge** is a cryptographic standard designed for secure **Agent-to-Agent (A2A)** communication. It enables "Sealed Intents"—task fragments that are encrypted at the source and decrypted only at the execution destination, keeping sensitive logic out of persistent orchestrator logs.
|
|
7
|
-
|
|
8
|
-
---
|
|
9
|
-
|
|
10
|
-
## 🛡️ The Problem: The Observer Paradox
|
|
11
|
-
In multi-agent systems, the central orchestrator typically logs all instructions. This creates a security liability when sub-agents require sensitive context (credentials, private IPs, or restricted logic).
|
|
12
|
-
|
|
13
|
-
**Molt-Cipher-Bridge** solves this by providing an "Opaque Handshake":
|
|
14
|
-
1. **Agents** share a temporary key.
|
|
15
|
-
2. **Intents** are sealed into fragments.
|
|
16
|
-
3. **Logs** only show cryptographic noise.
|
|
17
|
-
4. **Worker Agents** unseal the intent in isolated memory.
|
|
18
|
-
|
|
19
|
-
---
|
|
20
|
-
|
|
21
|
-
## 🚀 Installation
|
|
22
|
-
|
|
23
|
-
### Global (Recommended)
|
|
24
|
-
Install the CLI and library globally via PyPI:
|
|
25
|
-
```bash
|
|
26
|
-
pip install molt-cipher-bridge
|
|
27
|
-
```
|
|
28
|
-
|
|
29
|
-
### From Source (Development)
|
|
30
|
-
```bash
|
|
31
|
-
git clone https://github.com/CrimsonDevil333333/molt-cipher-bridge.git
|
|
32
|
-
cd molt-cipher-bridge
|
|
33
|
-
pip install -e .
|
|
34
|
-
```
|
|
35
|
-
|
|
36
|
-
---
|
|
37
|
-
|
|
38
|
-
## 🛠️ Usage for Agents & Bots
|
|
39
|
-
|
|
40
|
-
### 1. Global CLI Commands
|
|
41
|
-
Once installed, use the `molt-cipher` command directly from your terminal.
|
|
42
|
-
|
|
43
|
-
#### 🔐 Seal an Intent
|
|
44
|
-
Packages sensitive data into an encrypted JSON fragment.
|
|
45
|
-
```bash
|
|
46
|
-
molt-cipher seal --key "YOUR_FERNET_KEY" --sender "MainAgent" --to "SubAgent" --data '{"db_pass": "secret123"}'
|
|
47
|
-
```
|
|
48
|
-
|
|
49
|
-
#### 🔓 Unseal (Decrypt) a Fragment
|
|
50
|
-
Decodes the fragment and validates integrity/expiry.
|
|
51
|
-
```bash
|
|
52
|
-
molt-cipher unseal --key "YOUR_FERNET_KEY" --fragment '{"v": "1.1.0", "fid": "...", "payload": "..."}'
|
|
53
|
-
```
|
|
54
|
-
*Tip: Receiving agents should run this in isolated sessions to keep secrets out of logs.*
|
|
55
|
-
|
|
56
|
-
---
|
|
57
|
-
|
|
58
|
-
### 2. Python Library Usage
|
|
59
|
-
Integrate directly into your agent's logic:
|
|
60
|
-
|
|
61
|
-
```python
|
|
62
|
-
from molt_cipher_bridge import MoltCipherBridge
|
|
63
|
-
|
|
64
|
-
# Initialize with a shared key
|
|
65
|
-
bridge = MoltCipherBridge(shared_key=b'YOUR_SECRET_KEY...')
|
|
66
|
-
|
|
67
|
-
# Seal data
|
|
68
|
-
fragment = bridge.seal_intent("Sender", "Recipient", {"task": "deploy"})
|
|
69
|
-
|
|
70
|
-
# Unseal data
|
|
71
|
-
result = bridge.unseal_intent(fragment)
|
|
72
|
-
if result["success"]:
|
|
73
|
-
print(result["intent"])
|
|
74
|
-
```
|
|
75
|
-
|
|
76
|
-
---
|
|
77
|
-
|
|
78
|
-
## ✨ Features
|
|
79
|
-
- **Production Encryption**: Uses Fernet (AES-128-CBC + HMAC) for high-grade security.
|
|
80
|
-
- **TTL Expiry**: Fragments automatically expire (default 300s) to prevent replay attacks.
|
|
81
|
-
- **Multipart Fragments**: Support for splitting high-entropy secrets across multiple agents.
|
|
82
|
-
- **Key Hinting**: First 8 characters of the key are provided in fragments for instant verification.
|
|
83
|
-
- **Agent-Readable Spec**: Code-level documentation designed for LLMs to parse and implement.
|
|
84
|
-
|
|
85
|
-
---
|
|
86
|
-
|
|
87
|
-
## 🧪 Verified Test Scenarios
|
|
88
|
-
Live-tested between a Main Agent and a Sub-Agent on **2026-02-06**.
|
|
89
|
-
- **Case**: Passing DB credentials via "Sealed Intent".
|
|
90
|
-
- **Result**: Sub-agent successfully unsealed the task in an isolated session; orchestrator logs only showed the encrypted blob.
|
|
91
|
-
|
|
92
|
-
---
|
|
93
|
-
|
|
94
|
-
## 🔗 Links
|
|
95
|
-
- **PyPI Package**: [https://pypi.org/project/molt-cipher-bridge/](https://pypi.org/project/molt-cipher-bridge/)
|
|
96
|
-
- **Source Code**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge](https://github.com/CrimsonDevil333333/molt-cipher-bridge)
|
|
97
|
-
- **Issues**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues](https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues)
|
|
98
|
-
|
|
99
|
-
---
|
|
100
|
-
*Developed by Clawdy & Satyaa*
|
|
@@ -1,116 +0,0 @@
|
|
|
1
|
-
Metadata-Version: 2.4
|
|
2
|
-
Name: molt-cipher-bridge
|
|
3
|
-
Version: 1.2.0
|
|
4
|
-
Summary: A cryptographic standard for secure Agent-to-Agent (A2A) communication.
|
|
5
|
-
Author-email: Satyaa & Clawdy <clawdy@openclaw.ai>
|
|
6
|
-
License: MIT
|
|
7
|
-
Project-URL: Homepage, https://github.com/CrimsonDevil333333/molt-cipher-bridge
|
|
8
|
-
Project-URL: Bug Tracker, https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues
|
|
9
|
-
Classifier: Programming Language :: Python :: 3
|
|
10
|
-
Classifier: Operating System :: OS Independent
|
|
11
|
-
Requires-Python: >=3.8
|
|
12
|
-
Description-Content-Type: text/markdown
|
|
13
|
-
License-File: LICENSE
|
|
14
|
-
Requires-Dist: cryptography>=42.0.0
|
|
15
|
-
Dynamic: license-file
|
|
16
|
-
|
|
17
|
-
# 🦞 Molt-Cipher-Bridge | v1.1.0
|
|
18
|
-
|
|
19
|
-
[](https://pypi.org/project/molt-cipher-bridge/)
|
|
20
|
-
[](https://opensource.org/licenses/MIT)
|
|
21
|
-
|
|
22
|
-
**Molt-Cipher-Bridge** is a cryptographic standard designed for secure **Agent-to-Agent (A2A)** communication. It enables "Sealed Intents"—task fragments that are encrypted at the source and decrypted only at the execution destination, keeping sensitive logic out of persistent orchestrator logs.
|
|
23
|
-
|
|
24
|
-
---
|
|
25
|
-
|
|
26
|
-
## 🛡️ The Problem: The Observer Paradox
|
|
27
|
-
In multi-agent systems, the central orchestrator typically logs all instructions. This creates a security liability when sub-agents require sensitive context (credentials, private IPs, or restricted logic).
|
|
28
|
-
|
|
29
|
-
**Molt-Cipher-Bridge** solves this by providing an "Opaque Handshake":
|
|
30
|
-
1. **Agents** share a temporary key.
|
|
31
|
-
2. **Intents** are sealed into fragments.
|
|
32
|
-
3. **Logs** only show cryptographic noise.
|
|
33
|
-
4. **Worker Agents** unseal the intent in isolated memory.
|
|
34
|
-
|
|
35
|
-
---
|
|
36
|
-
|
|
37
|
-
## 🚀 Installation
|
|
38
|
-
|
|
39
|
-
### Global (Recommended)
|
|
40
|
-
Install the CLI and library globally via PyPI:
|
|
41
|
-
```bash
|
|
42
|
-
pip install molt-cipher-bridge
|
|
43
|
-
```
|
|
44
|
-
|
|
45
|
-
### From Source (Development)
|
|
46
|
-
```bash
|
|
47
|
-
git clone https://github.com/CrimsonDevil333333/molt-cipher-bridge.git
|
|
48
|
-
cd molt-cipher-bridge
|
|
49
|
-
pip install -e .
|
|
50
|
-
```
|
|
51
|
-
|
|
52
|
-
---
|
|
53
|
-
|
|
54
|
-
## 🛠️ Usage for Agents & Bots
|
|
55
|
-
|
|
56
|
-
### 1. Global CLI Commands
|
|
57
|
-
Once installed, use the `molt-cipher` command directly from your terminal.
|
|
58
|
-
|
|
59
|
-
#### 🔐 Seal an Intent
|
|
60
|
-
Packages sensitive data into an encrypted JSON fragment.
|
|
61
|
-
```bash
|
|
62
|
-
molt-cipher seal --key "YOUR_FERNET_KEY" --sender "MainAgent" --to "SubAgent" --data '{"db_pass": "secret123"}'
|
|
63
|
-
```
|
|
64
|
-
|
|
65
|
-
#### 🔓 Unseal (Decrypt) a Fragment
|
|
66
|
-
Decodes the fragment and validates integrity/expiry.
|
|
67
|
-
```bash
|
|
68
|
-
molt-cipher unseal --key "YOUR_FERNET_KEY" --fragment '{"v": "1.1.0", "fid": "...", "payload": "..."}'
|
|
69
|
-
```
|
|
70
|
-
*Tip: Receiving agents should run this in isolated sessions to keep secrets out of logs.*
|
|
71
|
-
|
|
72
|
-
---
|
|
73
|
-
|
|
74
|
-
### 2. Python Library Usage
|
|
75
|
-
Integrate directly into your agent's logic:
|
|
76
|
-
|
|
77
|
-
```python
|
|
78
|
-
from molt_cipher_bridge import MoltCipherBridge
|
|
79
|
-
|
|
80
|
-
# Initialize with a shared key
|
|
81
|
-
bridge = MoltCipherBridge(shared_key=b'YOUR_SECRET_KEY...')
|
|
82
|
-
|
|
83
|
-
# Seal data
|
|
84
|
-
fragment = bridge.seal_intent("Sender", "Recipient", {"task": "deploy"})
|
|
85
|
-
|
|
86
|
-
# Unseal data
|
|
87
|
-
result = bridge.unseal_intent(fragment)
|
|
88
|
-
if result["success"]:
|
|
89
|
-
print(result["intent"])
|
|
90
|
-
```
|
|
91
|
-
|
|
92
|
-
---
|
|
93
|
-
|
|
94
|
-
## ✨ Features
|
|
95
|
-
- **Production Encryption**: Uses Fernet (AES-128-CBC + HMAC) for high-grade security.
|
|
96
|
-
- **TTL Expiry**: Fragments automatically expire (default 300s) to prevent replay attacks.
|
|
97
|
-
- **Multipart Fragments**: Support for splitting high-entropy secrets across multiple agents.
|
|
98
|
-
- **Key Hinting**: First 8 characters of the key are provided in fragments for instant verification.
|
|
99
|
-
- **Agent-Readable Spec**: Code-level documentation designed for LLMs to parse and implement.
|
|
100
|
-
|
|
101
|
-
---
|
|
102
|
-
|
|
103
|
-
## 🧪 Verified Test Scenarios
|
|
104
|
-
Live-tested between a Main Agent and a Sub-Agent on **2026-02-06**.
|
|
105
|
-
- **Case**: Passing DB credentials via "Sealed Intent".
|
|
106
|
-
- **Result**: Sub-agent successfully unsealed the task in an isolated session; orchestrator logs only showed the encrypted blob.
|
|
107
|
-
|
|
108
|
-
---
|
|
109
|
-
|
|
110
|
-
## 🔗 Links
|
|
111
|
-
- **PyPI Package**: [https://pypi.org/project/molt-cipher-bridge/](https://pypi.org/project/molt-cipher-bridge/)
|
|
112
|
-
- **Source Code**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge](https://github.com/CrimsonDevil333333/molt-cipher-bridge)
|
|
113
|
-
- **Issues**: [https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues](https://github.com/CrimsonDevil333333/molt-cipher-bridge/issues)
|
|
114
|
-
|
|
115
|
-
---
|
|
116
|
-
*Developed by Clawdy & Satyaa*
|
|
File without changes
|
|
File without changes
|
{molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/SOURCES.txt
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
{molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/requires.txt
RENAMED
|
File without changes
|
{molt_cipher_bridge-1.2.0 → molt_cipher_bridge-1.3.0}/src/molt_cipher_bridge.egg-info/top_level.txt
RENAMED
|
File without changes
|