npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@ewimsatt/agent-vault

v0.1.0

Published

Zero-trust credential manager for AI agents — Node.js SDK

Readme

agent-vault — Node.js SDK

Zero-trust credential manager for AI agents. This is the read-only Node.js/TypeScript SDK for retrieving secrets from an agent-vault repository.

Secrets are encrypted locally using age encryption and synced via Git. No server, no SaaS -- the Git repo is an untrusted encrypted blob store. All crypto happens locally.

Installation

npm install agent-vault

Requires Node.js 20 or later.

Quick Start

import { Vault } from "agent-vault";

const vault = new Vault({
  repoPath: "/path/to/repo",
  keyPath: "~/.agent-vault/agents/my-agent.key",
});

// Decrypt a secret (pulls latest from Git first)
const apiKey = await vault.get("stripe/api-key");

API

new Vault(options)

Create a read-only vault instance.

| Option | Type | Default | Description | |------------|-----------|---------|--------------------------------------------------| | repoPath | string | - | Path to the Git repository containing the vault. | | keyPath | string? | - | Path to the age private key file. | | keyStr | string? | - | Raw age private key string. Overrides keyPath. | | autoPull | boolean | true | Whether to git pull before each get() call. |

Key resolution order:

  1. keyStr option
  2. keyPath option
  3. AGENT_VAULT_KEY environment variable
  4. ~/.agent-vault/owner.key

vault.get(secretPath): Promise<string>

Decrypt and return a secret value. The secret path follows the format group/name (e.g., stripe/api-key).

Throws SecretNotFoundError if the secret does not exist. Throws NotAuthorizedError if the key cannot decrypt it.

vault.listSecrets(group?): SecretMetadata[]

List secret metadata without decrypting. Optionally filter by group name.

vault.pull(): void

Manually trigger a git pull. Failures are logged to stderr but do not throw.

vault.listAgents(): Array<{ name: string; groups: string[] }>

List all agents and their group memberships from the manifest.

vault.reload(): void

Reload the manifest from disk (useful after a pull).

Error Types

import {
  VaultError,          // Base error
  VaultNotFoundError,  // No vault or key found
  SecretNotFoundError, // Secret path does not exist
  NotAuthorizedError,  // Key cannot decrypt the secret
  ManifestError,       // Manifest parsing failure
} from "agent-vault";

Environment Variables

  • AGENT_VAULT_KEY -- Raw age secret key string (used if no keyPath/keyStr provided)

How It Works

  1. The vault reads encrypted .enc files from .agent-vault/secrets/ in the repo.
  2. It decrypts them in memory using the age-encryption package.
  3. Decrypted values are never written to disk -- they exist only in memory.
  4. Metadata (.meta YAML files) can be browsed without decryption.

License

MIT