gloves
gloves is a secure secrets control plane for multi-agent runtimes and human operators.
It provides:
- agent-owned encrypted secrets
- human approval workflows
- access/audit controls
- vault and daemon operations
- an interactive TUI navigator
- a Bun OpenClaw client/plugin bridge for brokered secret injection
Documentation
Start here: Documentation Index
API and crate docs: docs.rs/gloves
- Quickstart
- Architecture
- Security
- Concepts and Parts
- Secrets and Requests
- Humans, Agents, and GPG
- TUI Guide
- Configuration Guide
- Troubleshooting
- VM Multi-Agent Operations
- Security Hardening
- Release Binaries
Command Model
Primary command groups:
gloves secrets ...: set/get/grant/revoke/statusgloves request ...: create one pending human requestgloves requests ...: list/approve/deny pending requestsgloves vault ...: encrypted vault operationsgloves gpg ...: per-agent GPG key workflowsgloves tui: interactive command center
Recursive help is supported:
Quick Example
# initialize runtime layout
# create one secret
# read secret
# list entries
If you omit --ttl, gloves uses defaults.secret_ttl_days from config; the built-in default is 30 days. Use --ttl never for a non-expiring secret. gloves secrets set prints the expiry timestamp for expiring secrets and says never expires otherwise.
For complete setup and human/agent workflows, use Quickstart.
OpenClaw Integration
The repository now includes:
gloves-mcpfor redacted MCP tool access@gloves/mcp-clientas the Bun/TypeScript bridge togloves-mcp@gloves/openclawas the OpenClaw Gateway plugin, including the secret-delivery logicintegrations/openclaw/gloves.json5as the reference config snippet
If you are setting up OpenClaw, the only package you should install is @gloves/openclaw.
The only remaining internal JS package is @gloves/mcp-client.
Recommended runtime path:
- install
@gloves/openclawon the Gateway host - let the plugin launch host-local
gloves-mcpsessions over stdio - allow the plugin tool group per agent with
group:plugins:gloves
Current plugin reads keep secret values out of the MCP result body and inject them into the sandbox environment or tmpfs instead. No sandbox bind mount to ~/.cargo/bin, a daemon socket, or the token path is required for the standard OpenClaw setup.
Compatibility transports:
socketPathremains available for non-OpenClaw or legacy runtime integrationsgloves daemonremains available for direct host-side automation- neither transport is the preferred OpenClaw deployment path
Install
From release binaries (recommended)
|
From crates.io
From source
Security and Policy
- Use least-privilege agent access in
.gloves.toml - Prefer
gloves secrets get --pipe-to <command>over raw stdout in automation - Keep secrets root and config permissions private
- Use
gloves audit --json --limit 100for machine-readable audit export
Details:
Development
When Docker is available, the OpenClaw sandbox harness can be exercised with:
That harness now models the recommended OpenClaw flow: a plugin running in the sandbox image launches bundled gloves-mcp over stdio and keeps tool responses redacted.