Install & start the daemon
$ npm install -g clauth-ai $ clauth init $ export CLAUTH_ADMIN_TOKEN='set-admin-token' $ clauth daemon
One-time setup. Runs locally on your machine — nothing leaves your network.
Clauth is a local daemon that sits between your AI agents and the APIs they call. It holds your credentials in an encrypted vault and injects them at request time — so agents get the job done without ever touching a secret.
Install, store your credentials once, and every agent you run is automatically protected.
$ npm install -g clauth-ai $ clauth init $ export CLAUTH_ADMIN_TOKEN='set-admin-token' $ clauth daemon
One-time setup. Runs locally on your machine — nothing leaves your network.
$ export GITHUB_PAT='ghp_xxx' $ export OPENAI_API_KEY='sk-xxx' $ clauth store --handle github-main --provider github --secret-env GITHUB_PAT $ clauth store --handle openai-main --provider openai --secret-env OPENAI_API_KEY
Encrypted at rest with AES-256-GCM. You set the passphrase, nobody else.
$ clauth grant --skill my-agent --provider github --scope github:read --rpm 60 $ clauth grant --skill my-agent --provider openai --scope openai:chat --rpm 60 $ clauth grant --skill my-agent --provider stripe --scope stripe:charges --rpm 30
Each agent gets only the permissions it needs. Nothing more.
Copy/paste runbook to provision a skill and validate a real brokered call.
$ export CLAUTH_PASSPHRASE='your-long-passphrase-here' $ export CLAUTH_ADMIN_TOKEN='set-admin-token' $ clauth init $ clauth daemon # in another terminal $ export CLAUTH_PASSPHRASE='your-long-passphrase-here' $ export GITHUB_PAT='ghp_xxx' $ clauth store --handle github-main --provider github --secret-env GITHUB_PAT $ clauth grant --skill my-agent --provider github --scope github:read --rpm 60 $ clauth skill-token issue --skill my-agent $ export CLAUTH_SKILL_TOKEN='<issued-token>' $ curl -sS -X POST http://127.0.0.1:4317/clauth/v1/proxy \ -H "content-type: application/json" \ -H "x-clauth-skill-token: $CLAUTH_SKILL_TOKEN" \ -d '{ "provider":"github","credentialHandle":"github-main","scope":"github:read","method":"GET","endpoint":"https://api.github.com/user" }' $ curl -sS http://127.0.0.1:4317/clauth/v1/status
Expected: proxy returns a 200 wrapper with upstream payload; status shows auditIntegrity.valid true; audit log contains proxy.allow.
Your skill never sees a credential. Just tell Clauth what you need — it handles the rest.
import { ClauthClient } from "clauth-ai/client"; const clauth = new ClauthClient({ skillId: "my-agent", skillToken: process.env.CLAUTH_SKILL_TOKEN }); // Make an API call — Clauth injects credentials const repos = await clauth.fetch( "github", "github-main", "github:read", "https://api.github.com/user/repos" ); console.log(repos.body); // Your repos. No token in sight.
Your code never handles secrets. Clauth injects auth headers at the network boundary.
Request only what you need. Clauth enforces least-privilege — unauthorized calls are blocked and logged.
Drop in the SDK. Built-in policies for popular providers; custom providers work with operator-defined allowlists.
Clauth watches for anomalies — unusual endpoints, rate spikes, off-hours activity — and blocks them automatically.
Clauth is designed so you don't have to trust Clauth. Everything is local, auditable, and under your control.
No cloud service, no SaaS, no third-party credential storage. Clauth is a local daemon — your secrets stay encrypted on disk and are only sent to the provider APIs you call.
No third-party runtime packages. Clauth runs on Node.js built-in modules; dev deps are TypeScript tooling only.
Every request, every grant, every anomaly — hash-chained and append-only. If someone edits history, integrity verification fails.
MIT licensed. Audit the source, fork it, self-host it. Security through transparency, not obscurity.
One command revokes every grant instantly. Compromised skill? Shut it down in seconds, not hours.
Clauth polls public advisory feeds and auto-revokes affected credentials before you even hear about the breach.
Explore the architecture, see a request flow in action, or compare the before and after.
A malicious skill steals your OAuth tokens and impersonates you across every connected platform
Payment credentials sitting in plaintext — one bad install drains your accounts
Stored card details are readable by any skill with file access. No encryption, no barrier.
Your cloud API keys get exfiltrated and sold — strangers run up thousands on your tab
Every skill has god-mode access to every credential you own
Zero anomaly monitoring — you find out when the bill arrives or the damage is done
No record of what was accessed, when, or by whom
When it happens, you manually rotate every key and hope you got them all
AES-256-GCM encrypted vault
Skills receive scoped handles, never tokens
Granular provider:action grants
Per-skill baselines with critical blocking
Hash-chained append-only event stream
Emergency revoke and advisory-driven revocations
Multiple private verification options
Near-zero during normal operation
Skill reads plaintext credential files, exfiltrates keys, and pivots across all connected providers before the user notices.
Skill has no secret file access. Unauthorized scope request is denied, logged, and surfaced as an anomaly with immediate revoke options.
If the interactive deep dive doesn't load, scripts may be blocked. The default view above is still accurate.
Everything you need to get started, integrate your skills, and harden your setup.
Install, store your first credential, and grant scoped access to a skill in under a minute.
End-to-end runbook to validate provider calls, denial paths, revocation behavior, and audit integrity.
ClauthClient API for skill developers — brokered fetch, identity verification, and health checks.
Full reference for the daemon HTTP API — proxy, admin, identity broker, and status routes.
Vault encryption, scope enforcement, behavioral anomaly detection, and audit integrity.
Transport modes, hardening options, alert routing, advisory feeds, and OAuth provider setup.
Private identity verification without public posting — OAuth, email, and signed challenge flows.