npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

straylight-ai

v0.5.0

Published

Zero-knowledge credential proxy for AI agents

Readme

Straylight-AI

Keep your API keys safe when using Claude Code, Cursor, and Windsurf.

Straylight-AI is a self-hosted credential proxy that sits between your AI coding assistant and external APIs. Your keys are stored in an encrypted vault and injected at the HTTP transport layer — they never appear in the AI's context window, prompts, logs, or responses.

Quick Start

npx straylight-ai

This will:

  1. Pull and start the Straylight-AI container (Docker or Podman)
  2. Open the dashboard at http://localhost:9470
  3. Register the MCP server with Claude Code (if installed)

Prerequisites

  • Docker or Podman
  • Node.js 18+

Add a Service

  1. Open http://localhost:9470
  2. Click "Add Service"
  3. Select a template (GitHub, Stripe, OpenAI, AWS, and more) or create a custom service
  4. Paste your API key — it goes straight into the encrypted vault

Connect to Your AI Coding Assistant

Claude Code

If not auto-registered during setup:

claude mcp add straylight-ai --transport stdio -- npx straylight-ai mcp

Cursor / Windsurf

Any MCP-compatible AI coding assistant works. The MCP server speaks the standard protocol over stdio.

CLI Commands

| Command | Description | |---------|-------------| | npx straylight-ai | Full setup (pull, start, register) | | npx straylight-ai start | Start the container | | npx straylight-ai stop | Stop the container | | npx straylight-ai status | Check health and service status | | npx straylight-ai logs | View container logs |

MCP Tools

Once registered, your AI coding assistant has access to:

| Tool | What It Does | |------|-------------| | straylight_api_call | Make an authenticated HTTP request. Credentials injected automatically. | | straylight_exec | Run a command with credentials as environment variables. Output sanitized. | | straylight_db_query | Query a database with dynamic temporary credentials. | | straylight_scan | Scan project files for exposed secrets. | | straylight_read_file | Read a file with secrets automatically redacted. | | straylight_check | Check whether a credential is available for a service. | | straylight_services | List all configured services and their status. |

How It Works

AI Coding Assistant  -->  straylight-mcp (stdio)  -->  Straylight Container
                                                          |
                                                    OpenBao Vault (encrypted)
                                                          |
                                                    HTTP Proxy (injects credentials)
                                                          |
                                                    External API (Stripe, GitHub, ...)

Your AI assistant calls a Straylight MCP tool. The container fetches the credential from the vault, injects it into the outbound HTTP request, and returns the sanitized API response. The AI gets the data it needs without ever seeing the key.

Database Credentials

Configure a database once in the dashboard. When your AI coding assistant needs data, it calls straylight_db_query — Straylight provisions a temporary database user, runs the query, and returns the results. The AI never sees the password.

// AI calls:
straylight_db_query(service="my-postgres", query="SELECT id, name FROM users LIMIT 10")
  • Credentials are read-only by default and auto-expire (5–15 min TTL)
  • Supported: PostgreSQL, MySQL/MariaDB, Redis
  • Full documentation

Cloud Credentials

Configure an AWS, GCP, or Azure account in the dashboard. When the AI needs to run a cloud CLI command, it calls straylight_exec with a named service — Straylight generates short-lived temporary credentials, injects them as environment variables, and returns the sanitized output.

// AI calls:
straylight_exec(service="aws-prod", command="aws s3 ls s3://my-bucket")
  • AWS: STS AssumeRole with inline session policies
  • GCP: Workload Identity Federation tokens
  • Azure: short-lived access tokens
  • Full documentation

Secret Scanner

Scan your project for exposed secrets before the AI reads them. Straylight checks files against 14 pattern categories and reports findings by file, line, and type.

// AI calls:
straylight_scan(path="/home/user/my-project")
  • Detects AWS keys, GitHub PATs, Stripe keys, connection strings, private keys, and more
  • Returns file paths, line numbers, secret types, and severity
  • Full documentation

File Firewall

Let the AI read files it needs without exposing secrets. straylight_read_file serves file contents with credentials redacted. Blocked files (.env, .pem, credentials.json) return guidance to use the vault instead.

// AI calls:
straylight_read_file(path="docker-compose.yml")
// Returns: file structure with passwords replaced by [STRAYLIGHT:service-name]
  • Blocked file patterns: .env*, *credentials*, *secret*, *.pem, SSH keys
  • Legitimate files served clean — structure intact, secrets masked
  • Full documentation

Audit Trail

Every credential access, API call, and command execution is logged with a timestamp, service name, tool used, and session ID. No credentials appear in the log.

View the audit log in the dashboard at http://localhost:9470 or query it via the API.

Supported Services

16+ pre-configured templates including GitHub, Stripe, OpenAI, Anthropic, AWS, Google Cloud, Azure, PostgreSQL, MySQL, Redis, Slack, GitLab, and more. Custom services supported via base URL and auth method configuration.

Security

  • Encrypted at rest — OpenBao (open-source HashiCorp Vault fork)
  • Transport-layer injection — credentials never exposed to the AI
  • Output sanitization — credential patterns stripped from all responses
  • Dynamic database credentials — temporary users with automatic revocation
  • Non-root container — UID 10001, minimal Alpine image

Optional: Claude Code Hooks

For extra protection, add hooks that block credential-accessing commands and sanitize output:

{
  "hooks": {
    "PreToolUse": [{
      "matcher": "Bash|Write|Edit",
      "hooks": [{ "type": "command", "command": "straylight-mcp hook pretooluse" }]
    }],
    "PostToolUse": [{
      "matcher": "Bash",
      "hooks": [{ "type": "command", "command": "straylight-mcp hook posttooluse" }]
    }]
  }
}

Links

License

Apache-2.0


Built by High Velocity Solutions LLC