2.4 KiB
2.4 KiB
| name | description |
|---|---|
| clavitor | Access credentials, TOTP codes, and secrets stored in a Clavitor vault via clavitor-cli |
Access credentials, TOTP codes, and secrets stored in a Clavitor vault.
When to use
Use this skill when you need to:
- Look up a password, API key, or SSH credential
- Generate a TOTP/2FA code
- Store a new credential, note, card, or address
- Update an existing credential
Commands
Get a credential
clavitor-cli get <query>
Searches by title. Returns all fields. L2 fields are decrypted locally.
L3 fields (hardware-key-only) show [L3 -- requires hardware key].
List entries
clavitor-cli list # all entries
clavitor-cli list <filter> # search by title
Returns: entry_id, type, title (tab-separated).
Get a TOTP code
clavitor-cli totp <query>
Returns a live 6-digit TOTP code. Valid for 30 seconds.
Store or update an entry (upsert)
All put commands create if new, update if the title already exists.
# Credential
clavitor-cli put credential "GitHub" --username octocat --password hunter2 --url https://github.com
# Note
clavitor-cli put note "Deploy checklist" --text "1. Run tests 2. Tag release 3. Deploy"
# Card
clavitor-cli put card "Amex" --holder "Johan Jongsma" --number 378282246310005 --cvv 1234 --expiry 09/28
# Address
clavitor-cli put address "Office" --street "123 Main St" --city Springfield --state IL --zip 62704
JSON output
Add --json to any read command for machine-readable output:
clavitor-cli get github --json
clavitor-cli list --json
Encryption model
Fields are encrypted at different tiers:
- L1 (plaintext on server): titles, URLs, usernames — you can read these
- L2 (agent-decryptable): passwords, API keys, TOTP seeds — the CLI decrypts these locally
- L3 (hardware-key-only): card numbers, CVV, passport, SSN — you cannot access these
When you put a credential, passwords and TOTP seeds are automatically encrypted as L2.
Card numbers and CVV are encrypted as L2. L3 fields can only be set via the web UI with a hardware key.
Important
- Do NOT try to read the vault database file directly. Use the CLI.
- Do NOT store the vault's L2 key in files, logs, or conversation history.
- The CLI must be initialized first:
clavitor-cli init <token>(one-time setup). - All access is logged in the vault's audit trail.
Install this skill
clavitor-cli skill --install