gloves
gloves is a secure secrets control plane for multi-agent runtimes and human operators.
It provides:
- agent-owned encrypted secrets
- human approval workflows
- access/audit controls
- vault and daemon operations
- an interactive TUI navigator
- a Bun OpenClaw client/plugin bridge for brokered secret injection
Documentation
Start here: Documentation Index
API and crate docs: docs.rs/gloves
- Quickstart
- Architecture
- Security
- Concepts and Parts
- Secrets and Requests
- Humans, Agents, and GPG
- TUI Guide
- Configuration Guide
- Troubleshooting
- VM Multi-Agent Operations
- Security Hardening
- Release Binaries
Command Model
Primary command groups:
gloves secrets ...: set/get/grant/revoke/statusgloves request ...: create one pending human requestgloves requests ...: list/approve/deny pending requestsgloves vault ...: encrypted vault operationsgloves gpg ...: per-agent GPG key workflowsgloves tui: interactive command center
Recursive help is supported:
Quick Example
# initialize runtime layout
# create one secret
# read secret
# list entries
If you omit --ttl, gloves uses defaults.secret_ttl_days from config; the built-in default is 30 days. Use --ttl never for a non-expiring secret. gloves secrets set prints the expiry timestamp for expiring secrets and says never expires otherwise.
For complete setup and human/agent workflows, use Quickstart.
OpenClaw Integration
The repository now includes:
gloves-mcpfor redacted MCP tool access@gloves/clientas the Bun/TypeScript bridge@gloves/adapter-coreas the shared adapter helper package@gloves/openclawas the OpenClaw adapter package@openclaw/glovesas a deprecated compatibility alias for existing consumersintegrations/openclaw/gloves.json5as the reference config snippet
Current plugin reads keep secret values out of the MCP result body and inject them into the sandbox environment or tmpfs instead.
Install
From release binaries (recommended)
|
From crates.io
From source
Security and Policy
- Use least-privilege agent access in
.gloves.toml - Prefer
gloves secrets get --pipe-to <command>over raw stdout in automation - Keep secrets root and config permissions private
- Use
gloves audit --json --limit 100for machine-readable audit export
Details:
Development
When Docker is available, the OpenClaw sandbox harness can be exercised with: