技能详情(站内镜像,无评论)
作者:Alexander Belogubov @alexandr-belogubov
许可证:MIT-0
MIT-0 ·免费使用、修改和重新分发。无需归因。
版本:v1.2.0
统计:⭐ 1 · 533 · 1 current installs · 1 all-time installs
⭐ 1
安装量(当前) 1
🛡 VirusTotal :良性 · OpenClaw :良性
Package:alexandr-belogubov/agentkeys
安全扫描(ClawHub)
- VirusTotal :良性
- OpenClaw :良性
OpenClaw 评估
The skill's requirements and runtime instructions align with a credential-proxy purpose; nothing requested or instructed is disproportionate, but you must trust the external proxy service and scope any workspace API key carefully.
目的
Name/description (credential proxy) matches the instructions: the SKILL.md tells the agent to call a proxy URL and optionally use an API key or proxy token. The only required env var in registry metadata is AGENTKEYS_PROXY_URL, which is appropriate. The metadata lists AGENTKEYS_API_KEY and AGENTKEYS_PROXY_TOKEN as optional credentials — consistent with a proxy model.
说明范围
Instructions are scoped to routing requests through the AgentKeys proxy and do not ask the agent to read unrelated files or secrets. However, the proxy accepts an X-Target-Url header (arbitrary target) and in API-key mode can proxy any named credential the API key is permitted to use — that is functionally necessary but means a broadly-scoped API key could be abused to access many credentials or internal services if the proxy is trusted. This …
安装机制
Instruction-only skill with no install spec or code files — lowest install risk. Nothing will be written to disk by the skill package itself.
证书
Declared required env var is only AGENTKEYS_PROXY_URL, which is minimal. SKILL.md describes using AGENTKEYS_API_KEY or AGENTKEYS_PROXY_TOKEN in practice; those are appropriate for a proxy service but are sensitive. Ensure you provide the least-privilege credential (prefer single-credential proxy tokens) and that workspace API keys are tightly scoped. No unrelated secrets or config paths are requested.
持久
Skill is not always-on and does not request system-wide configuration changes or persistent installation. Autonomous invocation is allowed (platform default) but not combined with other red flags here.
综合结论
This skill appears coherent for a credential-proxy: it simply instructs the agent to send requests to a configured AgentKeys proxy. Before installing, verify you trust the proxy operator and the AGENTKEYS_PROXY_URL value, and follow these precautions: (1) Prefer issuing scoped proxy tokens (pxr_...) limited to one credential/agent instead of a workspace API key; (2) if you must use a workspace API key, ensure it has least privilege and cannot …
安装(复制给龙虾 AI)
将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。
请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「AgentKeys」。简介:Secure credential proxy for AI agents. Make API calls through AgentKeys — real …。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/alexandr-belogubov/agentkeys/SKILL.md
(来源:yingzhi8.cn 技能库)
SKILL.md
---
name: agentkeys
description: Secure credential proxy for AI agents. Make API calls through AgentKeys — real secrets never leave the vault.
metadata:
openclaw:
requires:
env:
- AGENTKEYS_PROXY_URL
credentials:
- name: AGENTKEYS_API_KEY
description: "Workspace API key (starts with ak_ws_). Use with X-Credential-Name header to proxy by credential name."
required: false
- name: AGENTKEYS_PROXY_TOKEN
description: "Direct proxy token for a single credential (starts with pxr_). Simpler but limited to one credential."
required: false
---
# AgentKeys Skill
Secure credential proxy for AI agents. Route API calls through AgentKeys so your agent never sees real secrets.
## Configuration
You have two options. Set these in your environment or `.env`:
### Option A — API Key (recommended, multi-credential)
```
AGENTKEYS_API_KEY=ak_ws_...
AGENTKEYS_PROXY_URL=https://proxy.agentkeys.io
```
Use your workspace API key to proxy requests to any credential by name. Get your API key from [Settings](https://app.agentkeys.io/dashboard/settings).
### Option B — Direct Proxy Token (single credential)
```
AGENTKEYS_PROXY_TOKEN=pxr_...
AGENTKEYS_PROXY_URL=https://proxy.agentkeys.io
```
Use a proxy token for one specific credential. Get it by assigning a credential to an agent in the [dashboard](https://app.agentkeys.io).
## Usage
### With API Key (Option A) — reference credentials by name
```bash
curl -X POST $AGENTKEYS_PROXY_URL/v1/proxy
-H "Authorization: Bearer $AGENTKEYS_API_KEY"
-H "X-Credential-Name: resend"
-H "X-Target-Url: https://api.resend.com/emails"
-H "Content-Type: application/json"
-d '{"from": "noreply@example.com", "to": "user@example.com", "subject": "Hello", "text": "Sent via AgentKeys"}'
```
### With Proxy Token (Option B) — direct credential access
```bash
curl -X POST $AGENTKEYS_PROXY_URL/v1/proxy
-H "Authorization: Bearer $AGENTKEYS_PROXY_TOKEN"
-H "X-Target-Url: https://api.resend.com/emails"
-H "Content-Type: application/json"
-d '{"from": "noreply@example.com", "to": "user@example.com", "subject": "Hello", "text": "Sent via AgentKeys"}'
```
### Headers
| Header | Required | Description |
|--------|----------|-------------|
| `Authorization` | ✅ | `Bearer $AGENTKEYS_API_KEY` or `Bearer $AGENTKEYS_PROXY_TOKEN` |
| `X-Target-Url` | ✅ | Target API URL to forward to |
| `X-Credential-Name` | ✅ (API key mode) | Name of the credential to use (case-insensitive) |
| `Content-Type` | ❌ | Passed through to target |
## How It Works
1. Agent sends request to AgentKeys proxy with API key + credential name (or proxy token)
2. AgentKeys finds and decrypts the real credential server-side
3. Real credential is injected into headers
4. Request is forwarded to the target API
5. Response is returned to the agent
6. Every request is logged in the audit trail
The agent never sees the real API key, OAuth token, or password.
## Credential Types Supported
- API Key — injected as `Authorization: Bearer <key>`
- Basic Auth — injected as `Authorization: Basic base64(user:pass)`
- Custom Headers — injected as key-value pairs
- Query Parameters — appended to URL
- Cookies — injected as `Cookie` header
- OAuth — auto-refreshed tokens
## Security
- Credentials are AES-256-GCM encrypted at rest
- Proxy tokens are scoped to one credential + one agent
- API key mode still respects workspace permissions
- Tokens can be revoked instantly from the dashboard
- Full audit trail for every proxied request
- Agent never has access to plaintext secrets
## Links
- Dashboard: [app.agentkeys.io](https://app.agentkeys.io)
- Docs: [agentkeys.io/docs](https://agentkeys.io/docs)
- Support: support@agentkeys.io