1
Store secrets separately from metadata
KeyLore keeps raw credential values distinct from the metadata shown to
AI tools. The metadata can describe what a credential is for, which
service it targets, and when to use it, without exposing the token
itself.
2
Let agents search the AI-facing catalog
Supported clients such as Codex, Gemini CLI, Claude CLI, and generic
MCP clients can inspect the metadata layer to discover available
credentials. This gives the agent a structured way to find the right
option for a task.
3
Broker access when a tool actually needs it
When the workflow requires a credential, the client requests brokered
access through KeyLore rather than reading a raw token from process
state. The agent works through the broker instead of being handed the
underlying value.
4
Keep the default local-first
The standard install runs locally on your machine. You install the
package, start the local HTTP service, and open the UI in your browser.
That keeps the initial trust model simple and inspectable.