npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@inflectiv-ai/agentvault

v1.0.1

Published

Encrypted agent credential and memory vault with MCP server. Implements the AVP (Agent Vault Protocol) open standard.

Readme

AgentVault

npm version CI License: MIT

Encrypted credential and memory vault for AI agents. Implements the AVP (Agent Vault Protocol) open standard.

Your agent's API keys are in a .env file. Its learned knowledge lives in plaintext JSON. Any process on your machine can read both. AgentVault fixes that.

What it does

  • Encrypted secrets — AES-256-GCM, random salt per file, scrypt key derivation. Your API keys are encrypted at rest.
  • Encrypted memory — Your agent stores knowledge as it works. All encrypted. Keyword search runs in-memory after decryption.
  • Permission profiles — Control which secrets each agent sees. Your coding agent gets GitHub tokens. Your analytics agent gets read-only DB access. Your marketing agent never sees your Stripe keys.
  • Sandboxed executionagentvault wrap -p restrictive "claude-code ." runs any agent with only the credentials its profile allows.
  • Audit trail — Every credential access is logged. SQLite, append-only. Who accessed what, when, with which profile.
  • MCP server — Connect from Claude Code, Cursor, or any MCP-compatible tool. 11 tools for real-time vault access.
  • Portable vaults — Export encrypted subsets as .avault files. Hand them to another machine. Import with a passphrase.

Install

# Global install (adds `agentvault` to your PATH)
npm install -g @inflectiv-ai/agentvault

# Or run directly without installing
npx @inflectiv-ai/agentvault init

Quick start

# Initialize vault in your project
agentvault init

# Add secrets
agentvault secret add STRIPE_KEY "sk_live_..."
agentvault secret add OPENAI_KEY "sk-..."

# Store agent knowledge
agentvault memory store stripe-webhooks \
  "Always verify webhook signatures with the raw body, not parsed JSON" \
  -t knowledge --tags stripe webhook

# Search knowledge
agentvault memory query "stripe webhook verification"
# → [0.800] stripe-webhooks (knowledge) -- Always verify webhook...
# 1 result(s) from 3 entries

# Run an agent with controlled access
agentvault wrap -p moderate "claude-code ."

# Start MCP server for live agent connections
agentvault mcp start

# Health check
agentvault doctor

Commands

| Command | Description | |---------|-------------| | init | Initialize .agentvault/ with encrypted storage and profiles | | secret add/get/list/remove/import | Manage encrypted credentials | | profile list/show/create/delete | Manage permission profiles | | wrap -p <profile> "<command>" | Run agent in sandboxed environment | | memory store/query/list/remove/export/package | Manage encrypted agent memory | | vault export/import | Portable vault operations (.avault) | | mcp start | Start MCP server (stdio transport) | | audit show/export/clear | View credential access logs | | status | Vault status overview | | doctor | Health check and integrity verification | | preview -p <profile> | Dry-run: what an agent would see | | diff <profileA> <profileB> | Compare two profiles | | revoke | Kill active agent sessions | | wallet | Manage the signing wallet for x402 payments |

Documentation

Memory search

Keyword-based search with composite scoring:

score = matchRatio × confidence × freshnessDecay × recencyBoost
  • matchRatio: fraction of query tokens matched in entry keywords
  • confidence: stored confidence score (0.0–1.0)
  • freshnessDecay: linear decay over TTL
  • recencyBoost: frequently accessed entries get a small bump (max 10%)

Auto-extracts keywords from content on store. Merges with user-provided keywords.

Zero results return { results: [], totalSearched: N } so agents know the vault isn't empty.

Permission profiles

Three built-in profiles:

  • restrictive — Denies everything except system vars. For untrusted agents.
  • moderate — Allows common dev vars, redacts secrets, denies cloud credentials.
  • permissive — Allows everything with full audit trail. For trusted agents.

Security

  • AES-256-GCM encryption with random 32-byte salt per file
  • scrypt key derivation (N:16384, r:8, p:1)
  • File permissions: 0o600 (owner read/write only)
  • Directory permissions: 0o700
  • No telemetry, no phone-home, no network calls
  • Input validation on all keys, values, content, and tags
  • --dry-run on all destructive operations

MCP tools

11 tools available when running agentvault mcp start:

vault.secret.get, vault.secret.list, vault.memory.store, vault.memory.query, vault.memory.list, vault.memory.remove, vault.audit.show, vault.status, vault.profile.show, vault.preview, vault.export, vault.sign_x402

License

MIT