npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

agent-vault-cli

v0.1.0

Published

Secure credential vault CLI for AI agents - fills login forms via CDP without exposing credentials

Readme

Agent Vault CLI

Your AI agent can log into websites. Your credentials never touch the LLM.

Whether you're using personal accounts or dedicated agent credentials, they go straight from your keychain to the browser — never through the agent, never to the API.

Without Agent Vault:
User → "login with [email protected] / MySecret123" → Agent → LLM API
                                                               ↓
                                                      Credentials in:
                                                      • API logs
                                                      • Conversation history
                                                      • Training data (maybe)

With Agent Vault:
Agent → "log in" → Vault → Browser
                     ↓
        Agent sees: "success" or "failed"
        Credentials: never leave your keychain

⚠️ Early development — API may change. Feedback welcome.

Demo Video

🎬 Want to see it in action? Check out our demo video creation guide to record your own!

Quick Start

npm install -g @agent-vault/cli

1. Register credentials (you do this once, interactively):

vault register --cdp "ws://localhost:9222" \
  --username-selector "#email" \
  --password-selector "#password"

2. Let your agent log in (credentials never exposed):

vault login --cdp "ws://localhost:9222"

That's it. The agent calls vault login, gets back "success" or "failed", and continues with an authenticated session.


How It Works

The agent provides a browser (CDP endpoint). The vault:

  1. Connects directly to the browser
  2. Reads the current origin from the page (not from the agent)
  3. Looks up credentials for that origin in your OS keychain
  4. Fills the form and submits

The agent never handles, sees, or transmits credentials.


Why Not Use Existing Tools?

MCP credential tools (1Password MCP, authenticator_mcp, etc.) return credentials to the agent:

Vault → MCP Server → Returns credential → Agent has credential → LLM context

They solve "don't commit secrets to git." They don't solve "don't expose secrets to the LLM."

Password manager extensions keep credentials out of the LLM, but don't work in headless browsers — and that's where most production agents run.

Agent Vault works in headless. Credentials go directly from keychain to browser, no extension UI required.


What This Does (and Doesn't) Prevent

| Threat | Prevented? | |--------|------------| | Credentials slip into prompt/context | ✅ Yes | | Credentials in LLM API logs | ✅ Yes | | Credentials in conversation history | ✅ Yes | | Credentials in error messages | ✅ Yes | | Malicious agent inspects DOM/network | ❌ No |

This solves the 95% case: credentials shouldn't be in prompts, logs, or API calls by default.

The 5% case (active interception by a malicious agent) requires intentional attack code and leaves traces. Different threat model, different mitigations.


Commands

| Command | What it does | |---------|--------------| | vault register | Save credentials for a site (interactive) | | vault login | Fill credentials for current page | | vault list | Show registered sites | | vault delete --origin <url> | Remove credentials | | vault config set/get/list/unset | Manage defaults |

Config stored in ~/.agent-vault/config.json.


Agent Integration Example

# Your agent code
browser_navigate("https://github.com/login")
shell("vault login --cdp ws://localhost:9222")  # Returns success/failure
# Continue with authenticated session

Security Model

| Action | Agent provides | Agent sees credentials? | |--------|----------------|------------------------| | Register | CDP endpoint + selectors | Never (you enter them) | | Login | CDP endpoint only | Never (vault reads keychain) |


Development

npm install
npm run build
npm run dev    # watch mode
npm test

Creating Demo Videos

Want to create a demo video? We have scripts for that!

# Interactive guided demo (recommended)
npm run demo:interactive

# Automated demo
npm run demo:auto

# Create video with Remotion
npm run demo:video

See demo/GUIDE.md for complete instructions.


License

MIT