返回顶部
🇺🇸 English
🇨🇳 简体中文
🇨🇳 繁體中文
🇺🇸 English
🇯🇵 日本語
🇰🇷 한국어
🇫🇷 Français
🇩🇪 Deutsch
🇪🇸 Español
🇷🇺 Русский
h

headless-vault-cli

Read and edit Markdown notes on your personal computer via SSH tunnel. Use when the user asks to read, create, or append to notes in their vault.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.2.6
安全检测
已通过
1,616
下载量
1
收藏
概述
安装方式
版本历史

headless-vault-cli

# Headless Vault CLI Access Markdown notes on your personal computer from this VPS-hosted bot via SSH tunnel. **Terminology**: "Local machine" = your personal computer (macOS or Linux) where your notes live. This skill runs on the VPS and connects to your machine via a reverse SSH tunnel. ## Prerequisites This is an instruction-only skill. Before using it, the user must complete a one-time setup on their local machine: 1. **Install vaultctl** on the local machine (see [setup instructions](https://github.com/logancyang/headless-vault-cli)) 2. **Configure SSH forced-command** on the local machine's `~/.ssh/authorized_keys` to restrict the VPS key to only run `vaultctl` (see Security Model below) 3. **Start a reverse SSH tunnel** from the local machine to the VPS, exposing `localhost:2222` 4. **Set the environment variable** `VAULT_SSH_USER` to the local machine's username ## Security Model This skill connects to the local machine over a pre-configured reverse SSH tunnel. Access is restricted by design: - **Forced-command restriction**: The VPS SSH key is added to the local machine's `~/.ssh/authorized_keys` with a forced-command wrapper, so the VPS can ONLY execute `vaultctl` — no interactive shell, no arbitrary commands (`rm`, `curl`, etc.) - **Vault sandboxing**: `vaultctl` validates all file paths are inside `VAULT_ROOT` and rejects path traversal attempts (`..`, symlinks outside vault) - **Non-destructive**: Only `create` (new files) and `append` (existing files) are supported — no delete, rename, move, or overwrite - **No credentials stored**: SSH authentication uses the VPS's existing SSH keypair; no additional secrets are stored by this skill Example `authorized_keys` entry on the local machine: ``` command="/usr/local/bin/vaultctl-wrapper",no-port-forwarding,no-X11-forwarding,no-agent-forwarding ssh-ed25519 AAAA... vps-key ``` This ensures the VPS can only run `vaultctl` commands, even if the tunnel is compromised. ## Available Commands You have access to these commands ONLY. Do not attempt commands not listed here (no rename, delete, move, or edit commands exist). | Command | Description | |---------|-------------| | `tree` | List vault directory structure | | `resolve` | Find note by path or title | | `info` | Get file metadata (lines, bytes, sha256, mtime) | | `read` | Read note content | | `create` | Create a NEW note (fails if file exists) | | `append` | Append content to EXISTING note | ## How to Run Commands All commands are executed via SSH: ```bash ssh -4 -p ${VAULT_SSH_PORT:-2222} ${VAULT_SSH_USER}@${VAULT_SSH_HOST:-localhost} vaultctl <command> [args] ``` Always use `-4` to force IPv4 (avoids IPv6 timeout issues). ## Environment Variables These must be set in the skill's runtime environment on the VPS: | Variable | Required | Default | Description | |----------|----------|---------|-------------| | `VAULT_SSH_USER` | Yes | — | Local machine username for SSH tunnel | | `VAULT_SSH_PORT` | No | `2222` | SSH tunnel port on localhost | | `VAULT_SSH_HOST` | No | `localhost` | SSH tunnel host | ## Command Reference ### tree - List vault structure ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree --depth 2 ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree --all ``` Options: - `--depth N` - Maximum depth to traverse - `--all` - Include all files, not just .md ### resolve - Find note by path or title **ALWAYS use `--base64`** for path and title arguments to prevent shell injection: ```bash # echo -n "Projects/Plan.md" | base64 → UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl resolve --path UHJvamVjdHMvUGxhbi5tZA== --base64 # echo -n "Meeting Notes" | base64 → TWVldGluZyBOb3Rlcw== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl resolve --title TWVldGluZyBOb3Rlcw== --base64 ``` ### info - Get file metadata **ALWAYS use `--base64`** for the path argument: ```bash # echo -n "Projects/Plan.md" | base64 → UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl info UHJvamVjdHMvUGxhbi5tZA== --base64 ``` Returns JSON: `{"path": "...", "lines": N, "bytes": N, "sha256": "...", "mtime": N}` ### read - Read note content **ALWAYS use `--base64`** for the path argument: ```bash # echo -n "Projects/Plan.md" | base64 → UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl read UHJvamVjdHMvUGxhbi5tZA== --base64 ``` Returns JSON: `{"path": "...", "content": "..."}` ### create - Create a NEW note **IMPORTANT**: Use `--base64` flag with BOTH path AND content base64 encoded. This is required for paths/content with spaces or special characters. ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create <base64_path> <base64_content> --base64 ``` Example to create "Notes/Morning Brief.md" with content "# Hello\n\nWorld": ```bash # Encode path: echo -n "Notes/Morning Brief.md" | base64 → Tm90ZXMvTW9ybmluZyBCcmllZi5tZA== # Encode content: echo -n "# Hello\n\nWorld" | base64 → IyBIZWxsbwoKV29ybGQ= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create Tm90ZXMvTW9ybmluZyBCcmllZi5tZA== IyBIZWxsbwoKV29ybGQ= --base64 ``` - Creates parent directories automatically - Fails if file already exists (use `append` to add to existing files) - File must have `.md` extension - **NEVER duplicate the title as a heading inside the note content** (e.g., for "My Note.md", don't start content with "# My Note") ### append - Append to EXISTING note ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl append <base64_path> <base64_content> --base64 ``` - Fails if file does not exist (use `create` for new files) ## What You CANNOT Do These operations are NOT supported: - **Rename** files or folders - **Delete** files or folders - **Move** files between folders - **Edit** specific parts of a file (only append to end) - **Create** folders without a file (folders are created automatically with `create`) ## Tips - Always run `vaultctl tree` first to see what notes exist - Use `vaultctl resolve --title <base64> --base64` to find a note by name - All output is JSON - The local machine must be online with tunnel running - **ALWAYS use `--base64`** for ALL path and content arguments — this is mandatory for security, not optional ## Examples **Important**: Always run `tree` first if you're unsure what notes exist. This prevents errors from wrong paths or duplicate names. ### Example 1: User asks to read a note (check first) User: "Show me my project plan" Step 1 - Check what exists: ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree ``` Output: ```json {"tree": [{"path": "Projects", "type": "dir"}, {"path": "Projects/Plan.md", "type": "file"}]} ``` Step 2 - Now read the correct path (always base64 encode): ```bash # echo -n "Projects/Plan.md" | base64 → UHJvamVjdHMvUGxhbi5tZA== ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl read UHJvamVjdHMvUGxhbi5tZA== --base64 ``` Output: ```json {"path": "Projects/Plan.md", "content": "# Project Plan\n\n## Goals\n..."} ``` ### Example 2: User asks to create a note (check first to avoid duplicates) User: "Create a meeting notes file" Step 1 - Check what already exists: ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree ``` Output: ```json {"tree": [{"path": "Projects", "type": "dir"}, {"path": "Projects/Plan.md", "type": "file"}]} ``` Step 2 - No "Meeting Notes" exists, safe to create (do NOT duplicate title as heading): ```bash # echo -n "Meeting Notes.md" | base64 → TWVldGluZyBOb3Rlcy5tZA== # echo -n "## Agenda\n\n- Item 1\n- Item 2\n" | base64 → IyMgQWdlbmRhCgotIEl0ZW0gMQotIEl0ZW0gMgo= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create TWVldGluZyBOb3Rlcy5tZA== IyMgQWdlbmRhCgotIEl0ZW0gMQotIEl0ZW0gMgo= --base64 ``` Output: ```json {"status": "ok", "path": "Meeting Notes.md"} ``` ### Example 3: User asks about vault contents User: "What's in my notes?" ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree --depth 2 ``` Output: ```json {"tree": [{"path": "Projects", "type": "dir"}, {"path": "Projects/Plan.md", "type": "file"}, {"path": "Ideas.md", "type": "file"}]} ``` Then summarize for user: "You have a Projects folder with Plan.md, and an Ideas.md file at the root." ### Example 4: Complex workflow with source and output notes User: "According to the source note 'AI Digest Sources.md', browse the sources and output the digest to 'digest/2025-01-28-digest.md'" Step 1 - Check what exists: ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl tree ``` Output: ```json {"tree": [{"path": "AI Digest Sources.md", "type": "file"}, {"path": "digest", "type": "dir"}, {"path": "digest/2025-01-27-digest.md", "type": "file"}]} ``` Step 2 - Validate: - Source "AI Digest Sources.md" exists - Output "digest/2025-01-28-digest.md" does NOT exist, will use `create` (If source didn't exist: STOP and ask user "I couldn't find 'AI Digest Sources.md'. Did you mean one of these: [list alternatives]?") (If output already existed: use `append` instead of `create`) Step 3 - Read the source note (always base64 encode): ```bash # echo -n "AI Digest Sources.md" | base64 → QUkgRGlnZXN0IFNvdXJjZXMubWQ= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl read QUkgRGlnZXN0IFNvdXJjZXMubWQ= --base64 ``` Output: ```json {"path": "AI Digest Sources.md", "content": "# AI Digest Sources\n\n- https://example.com/article1\n- https://example.com/article2\n"} ``` Step 4 - Browse sources and generate digest content (done by bot outside this skill) Step 5 - Write output to vault (do NOT duplicate title as heading): ```bash # echo -n "digest/2025-01-28-digest.md" | base64 → ZGlnZXN0LzIwMjUtMDEtMjgtZGlnZXN0Lm1k # echo -n "## Summary\n\nKey points from today's sources...\n" | base64 → IyMgU3VtbWFyeQoKS2V5IHBvaW50cyBmcm9tIHRvZGF5J3Mgc291cmNlcy4uLgo= ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl create ZGlnZXN0LzIwMjUtMDEtMjgtZGlnZXN0Lm1k IyMgU3VtbWFyeQoKS2V5IHBvaW50cyBmcm9tIHRvZGF5J3Mgc291cmNlcy4uLgo= --base64 ``` (If output already existed, use `append` instead:) ```bash ssh -4 -p 2222 ${VAULT_SSH_USER}@localhost vaultctl append ZGlnZXN0LzIwMjUtMDEtMjgtZGlnZXN0Lm1k IyMgVXBkYXRlCi4uLg== --base64 ```

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 headless-vault-cli-1776379282 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 headless-vault-cli-1776379282 技能

通过命令行安装

skillhub install headless-vault-cli-1776379282

下载 Zip 包

⬇ 下载 headless-vault-cli v1.2.6

文件大小: 5.66 KB | 发布时间: 2026-4-17 14:22

v1.2.6 最新 2026-4-17 14:22
Block set-root from remote access to prevent vault sandbox bypass

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部