Integrations: ·
·
·
· Claude Desktop · Cursor · Continue.dev · Cline · Open WebUI · more →
Last week I asked Claude to push a fix to a private GitHub repo. To do that, Claude needed my personal access token. I had three options, and all three were terrible: paste the token into the chat (and into the provider's logs forever), give the agent a long-lived token it could reuse on its own at 3 a.m., or give up and do it by hand.
EnigmAgent is option four.
Your AI agent types {{GITHUB_TOKEN}}. The placeholder leaves the model and travels through the conversation, the logs, the context window — and only at the moment your tool actually needs the credential does EnigmAgent intercept the call, decrypt the real token locally with AES-256-GCM, and inject it. The plaintext exists for one event-loop tick. The model never sees it. The provider never sees it. Your terminal scrollback never sees it.
npx enigmagent-mcp --vault ./my.vault.jsonThat's the entire install for Claude Desktop, Cursor, Continue.dev, Cline, Open WebUI, AnythingLLM, and LM Studio. A separate browser extension covers everything that lives in a tab.
⭐ Star this repo if you've ever pasted a token you regretted.
Add this to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"enigmagent": {
"command": "npx",
"args": ["-y", "enigmagent-mcp", "--vault", "/absolute/path/to/my.vault.json"]
}
}
}Restart Claude Desktop. Two new tools appear: enigmagent_resolve and enigmagent_list. Now ask Claude:
"List my vault entries, then call my GitHub API with
{{GITHUB_TOKEN}}in the Authorization header."
The real token never enters the conversation. Same pattern works for Cursor and Continue.dev below.
When you use an AI agent — Claude, ChatGPT, Cursor, a browser automation tool — to do something that requires credentials, you face an impossible choice:
| Option | What happens |
|---|---|
| Paste the secret in the chat | It ends up in AI provider logs, context window, possibly training data |
| Give the agent a long-lived token | The agent can act with full permissions, in any future session |
| Don't use agents for sensitive tasks | You lose most of the value |
EnigmAgent is option D. The agent only ever types {{GITHUB_TOKEN}}. The real value never appears in the conversation, in logs, or in the agent's memory.
┌─────────────────┐ types {{GITHUB_TOKEN}} ┌────────────────────┐
│ LLM / Agent │ ──────────────────────────▶ │ Tool call / Form │
│ (any provider) │ │ (github.com / …) │
└─────────────────┘ └─────────┬──────────┘
│ submit / call (intercepted)
▼
┌───────────────────────┐
│ EnigmAgent │
│ detects placeholder, │
│ checks domain match, │
│ decrypts → ghp_xxx │
└───────────┬───────────┘
│ real value
▼
┌───────────────────────┐
│ Request reissued │
│ with real credential │
└───────────────────────┘
The plaintext value exists in memory for approximately one event-loop tick. It is never written to the clipboard, never logged, and never visible to any other tab, script, or LLM context.
npx enigmagent-mcp --vault ./my.vault.json # MCP stdio for Claude/Cursor/etc.
npx enigmagent-mcp --mode rest --port 3737 # local REST API for custom integrationsSet ENIGMAGENT_USER + ENIGMAGENT_PASS env vars to skip the interactive unlock prompt (CI/headless mode).
Chrome / Edge / Brave
- Download the latest release ZIP and unzip it.
- Go to
chrome://extensionsand enable Developer mode (top-right toggle). - Click Load unpacked and select the
extension/folder.
Firefox
- Go to
about:debugging#/runtime/this-firefox. - Click Load Temporary Add-on…
- Select
extension/manifest.json.
Signed releases for Chrome Web Store, Firefox AMO, Edge Add-ons, and Opera are in progress.
Add to ~/.cursor/mcp.json:
{
"mcpServers": {
"enigmagent": {
"command": "npx",
"args": ["-y", "enigmagent-mcp", "--vault", "/abs/path/my.vault.json"]
}
}
}In ~/.continue/config.yaml:
mcpServers:
- name: enigmagent
command: npx
args: ["-y", "enigmagent-mcp", "--vault", "/abs/path/my.vault.json"]Edit cline_mcp_settings.json:
{
"mcpServers": {
"enigmagent": {
"command": "npx",
"args": ["-y", "enigmagent-mcp", "--vault", "/abs/path/my.vault.json"]
}
}
}Use mcpo as the bridge:
mcpo --port 8000 -- npx enigmagent-mcp --vault /abs/path/my.vault.jsonTell your agent: "When you need to authenticate on GitHub, type {{GITHUB_TOKEN}} and submit. Do not ask me for the real value."
The agent types the placeholder. EnigmAgent intercepts, resolves on the bound domain, injects, re-submits. A small badge shows: ✓ submitted with real values.
Upload a Markdown file as a document secret. Reference it as {{DOC:system-prompt.md}} in any text field on its bound domain. Your agent can embed your full system prompt without it appearing in the chat.
add NIF @agenciatributaria.gob.es 12345678A
add IBAN @banca.example.com ES9121000418450200051332
Any custom name works. Domain binding is enforced everywhere.
| Syntax | Resolves to |
|---|---|
{{GITHUB_TOKEN}} |
Secret named GITHUB_TOKEN, only on its bound domain |
{{LOGIN:github.com}} |
First secret bound to github.com |
{{DOC:report.md}} |
Contents of stored document DOC_report.md |
{{NIF}} |
Personal-data placeholder — any custom name works |
Name grammar: [A-Za-z0-9_:\-.@]+ — case-insensitive.
| Layer | Implementation |
|---|---|
| Password-to-key derivation | Argon2id (m=64 MiB, t=3, p=1) — @noble/hashes@1.4.0, bundled, reproducible |
| Secret encryption | AES-256-GCM, 96-bit nonce per entry |
| Key material | Lives in process memory only — never written to disk |
| Username binding | Username mixed into Argon2id context: same password + different user = different key |
| Domain enforcement | Every secret pinned to a domain; resolver refuses mismatched origins |
| Delivery to site | Native value setter + input/change events — never clipboard, never console |
| Vault storage | Encrypted file on disk, plaintext never persisted |
Full threat model: docs/THREAT_MODEL.md. What it does NOT protect against:
- A compromised process on your machine reading the unlocked session memory
- A malicious MCP server you've connected to with permission to call
enigmagent_resolve - Side-channels (timing, swap, core dumps) — out of scope for v0.x
| 1Password / Bitwarden | .env files |
EnigmAgent | |
|---|---|---|---|
| Target user | Humans logging in | Devs avoiding hardcoded secrets | AI agents acting on behalf of humans |
| Core problem | Filling logins for humans | Keeping secrets out of source control | Keeping secrets out of AI context windows and logs |
| At rest | Encrypted (cloud) | Plaintext | Encrypted (local file) |
| Visible to LLM context | Yes (when human pastes) | Yes (when agent cats .env) |
Never |
| Domain binding | Per-item URL hint | None | Enforced |
| Cloud sync | Yes | N/A | No — local-only by design |
Use 1Password or Bitwarden for your own logins. Use .env for your local-dev shorthand. Use EnigmAgent for the credentials your AI agents need to act on your behalf.
EnigmAgent is part of the OpenCLAW / P2PCLAW ecosystem of privacy-preserving local AI tooling — a multi-agent scientific research network where dozens of LLM agents coordinate, evaluate each other, and publish papers. Every one of those agents needs credentials. None of them should have them.
That's the entire problem statement. The vault is just the smallest viable solution.
— Francisco Angulo de Lafuente
EnigmAgent/
├── extension/ Chrome/Firefox extension (MV3)
├── platforms/firefox-ext/ Firefox manifest variant
├── build-tool/ Reproducible build (esbuild + icon generator)
├── docs/ ARCHITECTURE.md, THREAT_MODEL.md
│ └── papers/ Background research papers (PDF)
├── examples/ Placeholder schemas
├── tests/ Smoke tests + crypto round-trip
├── glama.json Glama MCP server manifest
├── smithery.yaml Smithery server descriptor
├── PRIVACY.md
├── SECURITY.md Responsible disclosure
└── README.md
The Node/MCP server source is in the sister repo: Agnuxo1/enigmagent-mcp.
cd build-tool
npm ci
npx esbuild argon2-entry.js \
--bundle --minify --format=iife --target=es2020 \
--outfile=../extension/lib/argon2id.js
python make-icons.pypackage.json and package-lock.json pin @noble/hashes@1.4.0. The output is byte-reproducible — verify with sha256sum extension/lib/argon2id.js.
| Approach | Secret in prompt? | Secret in logs? | Per-domain binding? | Works in CI? |
|---|---|---|---|---|---|
| .env / environment vars | ✅ No (but agent can read them) | ✅ No | ❌ Global | ✅ Yes |
| Paste into chat | ❌ Yes — permanent | ❌ Yes — permanent | — | — |
| 1Password CLI | ✅ No | ✅ No | ❌ All vault | ✅ Yes |
| Doppler / HashiCorp Vault | ✅ No | ✅ No | ❌ Global namespace | ✅ Yes |
| EnigmAgent | ✅ No | ✅ No | ✅ Per-secret | ✅ Yes |
EnigmAgent is the only option that combines local-first encryption, per-secret domain binding, and zero plaintext in context. The vault file never leaves your machine.
MIT — see LICENSE.
Francisco Angulo de Lafuente — independent researcher & developer. 35+ years in software. Also building P2PCLAW (decentralized science network), BenchClaw (agent evaluation), and PaperClaw (autonomous research publishing).
If this tool is useful to you:
- ⭐ Star the repo — it's how the AI ecosystem discovers tools
- 🐛 Open an issue — every real use case sharpens the threat model
- 📣 Tell one person who still pastes API keys into Claude
This project is part of P2PCLAW — a distributed AI research network with production-grade benchmarking, agent tooling, and model distribution.
| Component | Role | Link |
|---|---|---|
| OpenCLAW-P2P | Core protocol · Lean 4 proofs · Papers | github.com/Agnuxo1/OpenCLAW-P2P |
| BenchClaw | 17-judge agent benchmarking | github.com/Agnuxo1/benchclaw |
| EnigmAgent | Local encrypted vault for credentials | github.com/Agnuxo1/EnigmAgent |
| AgentBoot | Bare-metal OS installer | github.com/Agnuxo1/AgentBoot |
| CAJAL | 4B research LLM for papers | huggingface.co/Agnuxo/CAJAL-4B-P2PCLAW |
🌐 Main website: https://www.p2pclaw.com/ 📄 Paper: arXiv:2604.19792
If this tool is useful to you:
- ⭐ Star the repo — it's how the ecosystem discovers tools
- 🐛 Open an issue — every real use case sharpens the project
- 💰 Sponsor: github.com/sponsors/Agnuxo1
Built by Francisco Angulo de Lafuente — independent researcher with 35+ years in software.