HN 표시: OneCLI – Rust의 AI 에이전트용 Vault
hackernews
|
|
🔬 연구
#ai
#review
#rust
#보안
#에이전트
#오픈소스
원문 출처: hackernews · Genesis Park에서 요약 및 분석
요약
AI 에이전트의 보안 취약점을 해결하기 위해 개발된 오픈소스 도구인 OneCLI가 공개되었습니다. 에이전트가 실제 자격 증명을 직접 저장하는 대신 OneCLI의 암호화된 볼트에 보관된 키를 프록시를 통해 교체하여 사용하는 방식으로 작동합니다. Rust로 작성되어 단일 Docker 컨테이너로 실행되며, 향후 접근 정책 설정 및 감사 기능을 지원할 계획을 포함하고 있습니다.
본문
The secret vault for AI agents. Store once. Inject anywhere. Agents never see the keys. OneCLI is an open-source gateway that sits between your AI agents and the services they call. Instead of baking API keys into every agent, you store credentials once in OneCLI and the gateway injects them transparently. Agents never see the secrets. Why we built it: AI agents need to call dozens of APIs, but giving each agent raw credentials is a security risk. OneCLI solves this with a single gateway that handles auth, so you get one place to manage access, rotate keys, and see what every agent is doing. How it works: You store your real API credentials in OneCLI and give your agents placeholder keys (e.g. FAKE_KEY ). When an agent makes an HTTP call through the gateway, the OneCLI gateway matches the request to the right credentials, swaps the FAKE_KEY for the REAL_KEY , decrypts them, and injects them into the outbound request. The agent never touches the real secrets. It just makes normal HTTP calls and the gateway handles the swap. - Rust Gateway: fast HTTP gateway that intercepts outbound requests and injects credentials. Agents authenticate with access tokens via Proxy-Authorization headers. - Web Dashboard: Next.js app for managing agents, secrets, and permissions. Provides the API the gateway uses to resolve which credentials to inject for each request. - Secret Store: AES-256-GCM encrypted credential storage. Secrets are decrypted only at request time, matched by host and path patterns, and injected by the gateway as headers. The fastest way to run OneCLI locally: git clone https://github.com/onecli/onecli.git cd onecli docker compose -f docker/docker-compose.yml up Open http://localhost:10254, create an agent, add your secrets, and point your agent's HTTP gateway to localhost:10255 . - Transparent credential injection: agents make normal HTTP calls, the gateway handles auth - Encrypted secret storage: AES-256-GCM encryption at rest, decrypted only at request time - Host & path matching: route secrets to the right API endpoints with pattern matching - Multi-agent support: each agent gets its own access token with scoped permissions - Easy setup: docker compose -f docker/docker-compose.yml up starts everything (app + PostgreSQL) - Two auth modes: single-user (no login) for local use, or Google OAuth for teams - Rust gateway: fast, memory-safe HTTP gateway with MITM interception for HTTPS - Vault integration: connect Bitwarden (or other password managers) for on-demand credential injection without storing secrets on the server apps/ web/ # Next.js app (dashboard + API, port 10254) gateway/ # Rust gateway (credential injection, port 10255) packages/ db/ # Prisma ORM + migrations ui/ # Shared UI components (shadcn/ui) docker/ Dockerfile # App image (gateway + web) docker-compose.yml - mise (installs Node.js, pnpm, and other tools) - Rust (for the gateway) - Docker (for PostgreSQL) mise install pnpm install cp .env.example .env pnpm db:generate pnpm db:up # Start PostgreSQL pnpm db:migrate # Apply migrations pnpm dev Dashboard at http://localhost:10254, gateway at http://localhost:10255. | Command | Description | |---|---| pnpm dev | Start web + gateway in dev mode | pnpm build | Production build | pnpm check | Lint + types + format | pnpm db:up | Start PostgreSQL (Docker) | pnpm db:down | Stop PostgreSQL | pnpm db:generate | Generate Prisma client | pnpm db:migrate | Run database migrations | pnpm db:studio | Open Prisma Studio | All environment variables are optional for local development: | Variable | Description | Default | |---|---|---| DATABASE_URL | PostgreSQL connection string | See .env.example | NEXTAUTH_SECRET | Enables Google OAuth (multi-user) | Single-user mode | GOOGLE_CLIENT_ID | Google OAuth client ID | — | GOOGLE_CLIENT_SECRET | Google OAuth client secret | — | SECRET_ENCRYPTION_KEY | AES-256-GCM encryption key | Auto-generated | We welcome contributions! Please read our Contributing Guide and Code of Conduct before getting started.
Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.
공유