11 comments

  • zimbatm16 minutes ago
    This is how keychains should be designed. Never return the secret, but mint a new token, or sign a request.<p>We need this also for normal usage like development environments. Or when invoking a command on a remote server.<p>Are you going to add support for services that don&#x27;t support OIDC or this going to be a known limitation?
  • sjdv198257 minutes ago
    What if kontext runs under the same user as Claude? Could it in principle inspect the kontext process and extract the key from memory?
  • measurablefunc18 minutes ago
    It should be possible to do this w&#x2F; eBPF. Monitor network i&#x2F;o &amp; rewrite the request on the fly to include the proper tokens &amp; signatures. The agent can just be given placeholder tokens. That way all the usual libraries work as expected &amp; the secrets&#x2F;signatures are handled w&#x2F;o worrying about another abstraction layer. Here is some prior art: <a href="https:&#x2F;&#x2F;riptides.io&#x2F;blog&#x2F;when-ebpf-isnt-enough-why-we-went-with-a-kernel-module&#x2F;" rel="nofollow">https:&#x2F;&#x2F;riptides.io&#x2F;blog&#x2F;when-ebpf-isnt-enough-why-we-went-w...</a>
  • amjd2 hours ago
    Congrats on the launch! What are the key advantages of this compared to OneCLI[1]?<p>[1]: <a href="https:&#x2F;&#x2F;github.com&#x2F;onecli&#x2F;onecli" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;onecli&#x2F;onecli</a>
    • mc-serious2 hours ago
      Great question. Two main differences:<p>Workflow: OneCLI runs as a self-hosted Docker gateway — you route agent traffic through localhost:10255. Kontext doesn&#x27;t change how you use Claude Code at all, just kontext start --agent claude.<p>Visibility layer: OneCLI intercepts outbound HTTP requests. Kontext hooks into Claude&#x27;s PreToolUse&#x2F;PostToolUse events, so you see bash commands, file ops, and API calls and not just network traffic.<p>Trust model tradeoff worth naming: OneCLI is fully self-hosted. Kontext holds secrets server-side and mints short-lived tokens per session. We do this via token exchange, RFC 8693, and natively build upon Oauth to support only handing over short-lived tokens - you don&#x27;t need to capture refresh tokens for external tool calls at all.
      • esafranchik2 hours ago
        Does this work with <i>any</i> tool calls that make an HTTP request? e.g. calling `curl` directly vs writing a script to make the request, then calling it
        • mc-serious2 hours ago
          Yes, with one important distinction: our visibility is at the agent tool boundary, not the raw network layer.<p>So if Claude Code invokes Bash and runs curl ..., we see that tool invocation. If it invokes Bash and runs python script.py, and that script makes HTTP requests internally, we still see the Bash invocation.
  • sarahroehm2 hours ago
    Finally a solution which focuses on contextual authorization - evaluating the agent&#x27;s reasoning trace when it requests a credential, only issuing it if the intent matches what the user authorized.. developer-focused and self-serve.Happy Launch day!!
  • airstrike2 hours ago
    Really cool and much needed!<p>I was actually just about to get started writing this but in Rust....
    • mc-serious1 hour ago
      Nice! I&#x27;d love to hear what you think about our approach, and what features you&#x27;d like to see first.
  • traceroute662 hours ago
    Sounds awfully similar to Tailscale Aperture[1]<p>[1] <a href="https:&#x2F;&#x2F;tailscale.com&#x2F;blog&#x2F;aperture-self-serve" rel="nofollow">https:&#x2F;&#x2F;tailscale.com&#x2F;blog&#x2F;aperture-self-serve</a>
    • mc-serious1 hour ago
      Thanks for flagging - wasn&#x27;t aware of Aperture! It&#x27;s a little different to what the Kontext CLI does though.<p>Aperture solves “make multiple coding agents talk to the right LLM backend through an Aperture proxy.” We solve “launch a governed agent session with identity, short-lived third-party credentials, and tool-level auditability.” They overlap at the launcher layer, but the security goals are different.
  • 0xOsprey1 hour ago
    Yup I needed this bad for my NanoClaw<p>Nice work
  • Vishi32 hours ago
    Can I integrate this with my coding agents?
  • priyac-dev8bca28 minutes ago
    [dead]
  • augmentedmike2 hours ago
    [dead]