yagna-1/aegis
Credential proxy for AI agents
Platform-specific configuration:
{
"mcpServers": {
"aegis": {
"command": "npx",
"args": [
"-y",
"aegis"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
<div align="center">
<p><strong>Secure credential proxy for AI agents</strong></p>
<p> <a href="https://github.com/yagna-1/aegis/blob/main/LICENSE"></a> <a href="https://github.com/yagna-1/aegis/blob/main/CODE_OF_CONDUCT.md"></a> <a href="https://go.dev/"></a> <a href="https://github.com/yagna-1/aegis/releases"></a> <a href="https://github.com/yagna-1/aegis/packages"></a> <a href="https://github.com/yagna-1/aegis/tags"></a> <a href="https://github.com/yagna-1/aegis/stargazers"></a> <a href="https://github.com/yagna-1/aegis/commits/main"></a> </p>
<p> <a href="#quickstart-5-minutes"><strong>Quickstart</strong></a> · <a href="#ide-integration-mcp-mode"><strong>MCP Integration</strong></a> · <a href="#security-model"><strong>Security Model</strong></a> </p> </div>
A lightweight credential proxy for AI agent workflows. Sits between your agent and any API — injecting real secrets at the network boundary. The agent never sees credentials.
Single-binary Go runtime with a compact footprint: ~17 MB executable, ~660 KB repo size, and ~76 KB internal source.
Works natively as an MCP server with Cursor, **Cla
Loading reviews...