Introduction
1claw is a cloud-hosted Hardware Security Module (HSM) secrets manager for humans and AI agents. It lets you store API keys, tokens, and other credentials in a vault encrypted by keys that never leave the HSM. You control which agents can access which secrets, with what permissions, and for how long — and agents fetch secrets at runtime instead of holding them in context or environment.
Three products
1claw is built around three products that work together:
| Product | What it does | Docs |
|---|---|---|
| Vault | Store and manage secrets; Human API, Agent API, and MCP for just-in-time secret access | Vault → |
| Shroud | LLM proxy that inspects and redacts before forwarding to OpenAI, Anthropic, Google (Gemini), and others; blocks prompt injection and hides secrets | Shroud → |
| Intents | Let agents sign and broadcast blockchain transactions without ever seeing private keys | Intents → |
- Vault is the core: dashboard, REST API, MCP server, CLI, and SDKs all talk to the same vault. Create vaults, store secrets at paths, register agents, and attach policies that grant read/write access.
- Shroud sits between your agent and the LLM provider. Send requests to
shroud.1claw.xyzinstead of directly to the provider; Shroud enforces policies, redacts secrets, and detects prompt injection. - Intents extends the vault with transaction signing. Enable the Intents API on an agent; the agent submits transaction intents; the server signs in the HSM (or in Shroud’s TEE) and broadcasts. The private key never leaves the vault.
Architecture
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ Dashboard │────▶│ Vault API │◀────│ MCP Server │
│ (Next.js) │ │ (Rust) │ │ (Node.js) │
│ 1claw.xyz │ │ api.1claw.xyz │ mcp.1claw.xyz
└─────────────┘ └──────┬──────┘ └─────────────┘
│
┌──────────┼──────────┐
▼ ▼ ▼
┌──────────┐ ┌──────┐ ┌──────────┐
│ Supabase │ │ KMS │ │ Audit │
│ Postgres │ │(keys)│ │ (log) │
└──────────┘ └──────┘ └──────────┘
- Dashboard — The web UI at 1claw.xyz where humans manage vaults, secrets, agents, and policies.
- Vault API — The Rust backend that handles authentication, envelope encryption, policy enforcement, and all CRUD operations. Both the dashboard and MCP server talk to it.
- Shroud — Optional LLM proxy at shroud.1claw.xyz; agents can send LLM traffic through Shroud for inspection and redaction. Transaction signing can also run in Shroud’s TEE.
- MCP Server — A Model Context Protocol server that gives AI agents (Claude, Cursor, GPT) just-in-time access to vault secrets and Intents. Hosted at
mcp.1claw.xyzor run locally.
How humans and agents interact
- Humans log in (email/password or Google) or use a personal API key (
1ck_). They create vaults, store secrets at paths, register agents, and attach policies that grant agents (or users) read/write access to path patterns. - Agents authenticate with an agent API key (
ocv_) viaPOST /v1/auth/agent-tokento get a short-lived JWT, then call the same API to list secrets and fetch secret values by path. Access is enforced by policies; all access is audited.
Two APIs, one base URL
The same REST API serves both personas:
| Persona | Auth | Typical operations |
|---|---|---|
| Human | Email/password or Google → JWT; or personal API key → JWT | Create vaults, PUT/GET/DELETE secrets, create/list policies, register agents, audit logs |
| Agent | Agent API key → JWT via /v1/auth/agent-token | GET secret by path, list secrets in a vault (subject to policies) |
Base URL: https://api.1claw.xyz (or your Cloud Run URL). The dashboard at 1claw.xyz proxies /api/v1/* to the same API.
How to navigate these docs
- Concepts — Vaults, secrets, policies, agents, HSM architecture, and parts of 1claw (three products + Dashboard, API, MCP, CLI, SDK).
- Vault — Quickstart, Human API, Agent API, MCP Server, and all vault-related guides (access control, rotation, CMEK, sharing, CLI, billing, troubleshooting).
- Shroud — LLM proxy setup, supported providers (OpenAI, Anthropic, Google/Gemini, OpenRouter, etc.), threat detection, and vault-backed API keys.
- Intents — Enabling the Intents API, submitting transactions, guardrails, simulation, and supported chains.
- SDKs — TypeScript/JavaScript, Python, and curl examples.
- Security — HSM, key hierarchy, zero-trust, compliance.
- Reference — API reference, request pipeline, error codes, rate limits, glossary, changelog.
Next steps
- What is 1claw? — Core concepts in more detail.
- Parts of 1claw — Three products (Vault, Shroud, Intents) and how to use them (Dashboard, API, MCP, CLI, SDK).
- Quickstart for humans — Log in and store your first secret.
- Quickstart for agents — Get an agent token and fetch a secret.
- Shroud — Route LLM traffic through Shroud for inspection and redaction.
- Intents API — Let agents sign transactions without seeing keys.
- Glossary — Definitions of vault, secret, policy, agent, and other terms.