frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Show HN: OneCLI – Vault for AI Agents in Rust

https://github.com/onecli/onecli
44•guyb3•1h ago
We built OneCLI because AI agents are being given raw API keys. And it's going about as well as you'd expect. We figured the answer isn't "don't give agents access," it's "give them access without giving them secrets."

OneCLI is an open-source gateway that sits between your AI agents and the services they call. You store your real credentials once in OneCLI's encrypted vault, and give your agents placeholder keys. When an agent makes an HTTP call through the proxy, OneCLI matches the request by host/path, verifies the agent should have access, swaps the placeholder for the real credential, and forwards the request. The agent never touches the actual secret. It just uses CLI or MCP tools as normal.

Try it in one line: docker run --pull always -p 10254:10254 -p 10255:10255 -v onecli-data:/app/data ghcr.io/onecli/onecli

The proxy is written in Rust, the dashboard is Next.js, and secrets are AES-256-GCM encrypted at rest. Everything runs in a single Docker container with an embedded Postgres (PGlite), no external dependencies. Works with any agent framework (OpenClaw, NanoClaw, IronClaw, or anything that can set an HTTPS_PROXY).

We started with what felt most urgent: agents shouldn't be holding raw credentials. The next layer is access policies and audit, defining what each agent can call, logging everything, and requiring human approval before sensitive actions go through.

It's Apache-2.0 licensed. We'd love feedback on the approach, and we're especially curious how people are handling agent auth today.

GitHub: https://github.com/onecli/onecli Site: https://onecli.sh

Comments

anthonyskipper•1h ago
The fake key for real key thing seems like a problem. A lot of enterprise scanning tools look for keys in repos and other locations and you will get a lot of false positives.

Otherwise this is cool, we need more competition here.

guyb3•1h ago
It's a good point, I don't think the placeholders we use will trigger a secret scanner, but we can adjust if it's an issue.

https://github.com/onecli/onecli/blob/942cfc6c6fd6e184504e01...

atonse•1h ago
IronClaw seems to do this natively, I like the idea in general, so it's good too see this pulled out.

I have few questions:

- How can a proxy inject stuff if it's TLS encrypted? (same for IronClaw and others)

- Any adapters for existing secret stores? like maybe my fake credential can be a 1Password entry path (like 1Password:vault-name/entry/field and it would pull from 1P instead of having to have yet another place for me to store secrets?

inssein•4m ago
You use a forward proxy that can MITM.
debarshri•58m ago
Does it act like an auth proxy?
hardsnow•50m ago
This is the right approach. I built a similar system to https://github.com/airutorg/airut - couple of learnings to share:

1) Not all systems respect HTTP_PROXY. Node in particular is very uncooperative in this regard.

2) AWS access keys can’t be handled by simple credential swap; the requests need to be resigned with the real keys. Replicating the SigV4 and SigV4A exactly was bit of a pain.

3) To be secure, this system needs to run outside of the execution sandbox so that the agent can’t just read the keys from the proxy process.

For Airut I settled on a transparent (mitm)proxy, running in a separate container, and injecting proxy cert to the cert store in the container where the agent runs. This solved 1 and 3.

lancetipton•15m ago
Im literally working on the exact same solution. Difference is I'm running the system in a Kubernetes cluster.

I essentially run a sidecar container that sets up ip tables that redirect all requests through my mitm proxy. This was specifically required because of Node not respecting HTTP_PROXY.

Also had to inject a self signed cert to ensure SSL could be proxied and terminated by the mitm proxy, which then injects the secrets, and forwards the request on.

Have you run into any issues with this setup? I'm trying to figure out if there's anything I'm missing that might come back to bite me?

inssein•5m ago
This is basically what https://www.verygoodsecurity.com/ (their main product), but it's heavily focused on credit card data.
sathish316•50m ago
This can also be done using existing Vaults or Secrets manager. Hashicorp Vault can do this and agents can be instructed to get secrets, which are set without the agent's knowledge. I use these 2 simple scripts with OpenClaw to achieve this, along with time-scoped expiration. The call to vault_get.sh is inside the agent's skill script so that the secrets are not leaked to LLMs or in any trace logs:

vault_get.sh: https://gist.github.com/sathish316/1ca3fe1b124577d1354ee254a...

vault_set.sh: https://gist.github.com/sathish316/1f4e6549a8f85ac5c5ac8a088...

Blog about the full setup for OpenClaw: https://x.com/sathish316/status/2019496552419717390

rgbrgb•40m ago
It seems that the architecture you describe still gives the key to the agent (who could email it to red team or perform nefarious actions with it). The advantage of OP's architecture is that the agent never sees the key and you could inspect the request before proxying it. Is that right or do I misunderstand something?
jpbryan•49m ago
Why not just use AWS Secrets Manager?
stevekemp•16m ago
A program making a call to github.com needs an authentication token.

What are you suggesting? The program makes a call to retrieve the secret from AWS? Then has full access to do with it what they want? That's exactly the risk and the problem this, and related solutions mentioned in this thread, is trying to solve.

empath75•47m ago
Don't see any reason to use this over vault.
captn3m0•36m ago
This problem+solution, like many others in the agentic-space, have nothing agent-specific. Giving a "box" API keys was always considered a risk, and auth-proxying has existed as a solution forever. See tokenizer[0] by the fly.io team, which makes it a stateless service for eg - no database or dashboard. Or the buzzfeed SSO proxy, which lets you do the same via an OAuth2-dance at the frontend, and a upstream config at the backend which injects secrets: https://github.com/buzzfeed/sso/blob/549155a64d6c5f8916ed909....

[0]: https://github.com/superfly/tokenizer

RhodesianHunter•31m ago
Just because it's been done before for a different use-case doesn't mean that building exclusively for this use-case doesn't remove friction.
Olshansky•36m ago
tl;dr "scrt [set|get|list|....]" is also a great option

---

If this is of interest, I also recommend looking into: https://github.com/loderunner/scrt.

To me, it's a compliment to 1password.

I use it to save every new secret/api key I get via the CLI.

It's intentionally very feature limited.

Haven't tried it with agents, but wouldn't be surprised if the CLI (as is) would be enough.

paxys•5m ago
You don't want to give the agent a raw key, so you give it a dummy one which will automatically be converted into the real key in the proxy.

So how does that help exactly? The agent can still do exactly what it could have done if it had the real key.

GFiber and Stonepeak's Astound to Combine

https://fiber.googleblog.com/2026/03/gfiber-and-stonepeaks-astound-to.html
1•xnx•1m ago•0 comments

Europol and international partners disrupt 'SocksEscort' proxy service

https://www.europol.europa.eu/media-press/newsroom/news/europol-and-international-partners-disrup...
1•jruohonen•1m ago•0 comments

Vela: The True Scale of a Hidden Giant Structure Revealed

https://www.sarao.ac.za/news/vela-the-true-scale-of-a-hidden-giant-structure-revealed/
1•layer8•1m ago•1 comments

Hey HN – Metrx, scorecard for AI agents to understand and optimize their worth

1•ckpark123•2m ago•0 comments

Opennic: Open and community owned DNS root

https://opennic.org/
1•mghackerlady•2m ago•0 comments

Formal foundations of AlphaGeometry: A Lean 4 mechanization

https://zenodo.org/records/18959740
1•AnthonyBordg•3m ago•1 comments

FullStacked, combine Browser and Node.js APIs in a single runtime

https://v1.fullstacked.org
2•cpdabeast•3m ago•1 comments

A simple cryptography native static website deployment toolkit

https://github.com/4pito3pito2pi/unveil-static-site
1•morpheos137•3m ago•1 comments

ReachScan – Static reachability analysis for MCP servers and AI agents

https://github.com/vinmay/reachscan
1•vinmay•4m ago•0 comments

ClawMemory – Git for AI agent memory (forkable memory for AI agents)

1•Brettinhere•5m ago•0 comments

Generation Jones

https://en.wikipedia.org/wiki/Generation_Jones
2•jamesgill•6m ago•0 comments

Dev Cleanup Utility – safe Xcode cleanup for macOS developers

https://apps.apple.com/us/app/dev-cleanup-utility/id1621582261?mt=12
1•kovallux•7m ago•1 comments

Humorous RFCs

https://tangentsoft.com/rfcs/humorous.html
1•tylerdane•8m ago•0 comments

UI Playground — Explore iOS UI components directly on your iPhone

https://www.uiplayground.app/
2•efenande•8m ago•1 comments

Show HN: MoneyOnFIRE – FI date and action plan (v2)

https://www.moneyonfire.com
3•LambdaAndLatte•10m ago•0 comments

Certbot and Let's Encrypt Now Support IP Address Certificates

https://www.eff.org/deeplinks/2026/03/certbot-and-lets-encrypt-now-support-ip-address-certificates
4•speckx•11m ago•0 comments

Nvidia Builds Open Data for AI

https://huggingface.co/blog/nvidia/open-data-for-ai
2•gmays•12m ago•0 comments

ChatGPT Edu feature reveals researchers' project metadata across universities

https://www.fastcompany.com/91507219/chatgpt-edu-researchers-project-metadata-universities-exclusive
2•Cynddl•13m ago•0 comments

Zoloft, Revisited

https://thefrontierpsychiatrists.substack.com/p/zoloft-revisited
2•surprisetalk•13m ago•1 comments

Vertical Integrators (2024)

https://www.notboring.co/p/vertical-integrators
2•surprisetalk•13m ago•0 comments

Place Capability Graphs [video]

https://www.youtube.com/watch?v=JcQX8raHWQE
2•surprisetalk•13m ago•0 comments

Oh, Ambien

https://thefrontierpsychiatrists.substack.com/p/oh-ambien
2•surprisetalk•13m ago•1 comments

Show HN: HCAP – Agent-to-agent (A2A) negotiation

https://www.hcap.dev/
2•krishnamzg•14m ago•0 comments

The Weighted Hotel Minibar Is Wildly Outdated

https://www.insidehook.com/hotels/weighted-minibar-hotel-industry-most-outdated-feature
2•RickJWagner•14m ago•0 comments

Research Links Daily Multivitamins to Slower Biological Aging

https://www.sci.news/medicine/daily-multivitamins-slower-biological-aging-14617.html
2•brandonb•14m ago•0 comments

Kaida Shield – Runtime behavioral monitoring for autonomous AI agents

https://github.com/ajpandit775/kaida-shield
2•panditaditya21•14m ago•1 comments

Shooting at Michigan Shul

https://www.freep.com/story/news/local/michigan/oakland/2026/03/12/temple-israel-shooting-west-bl...
3•marysminefnuf•14m ago•0 comments

The Mag 7 Are Dead. How the Hottest Trade of the Decade Fizzled Out

https://www.barrons.com/articles/stock-movers-1d7440f2?st=eVZYpD
2•RickJWagner•15m ago•0 comments

How we compare model quality in Cursor

https://cursor.com/blog/cursorbench
4•ingve•15m ago•0 comments

Ask HN: Why is my submission not visible if I am not logged in?

2•beepbooptheory•16m ago•3 comments