MCP Catalogs
Home

janee

by rsdouglas·28·Score 44

Janee is an MCP server that provides secure secrets management for AI agents, enabling API access without exposing raw credentials.

securitydeveloper-toolsai-llm
6
Forks
3
Open issues
2 mo ago
Last commit
2d ago
Indexed

Overview

Janee sits between AI agents and APIs, injecting credentials while maintaining zero-knowledge for agents. It provides full audit trails, request policies, session TTLs, and works with any MCP client. The solution keeps encrypted keys locally and supports various authentication methods including bearer tokens, OAuth, AWS SigV4, and GitHub App auth.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Securely enable AI agents to access various APIs without exposing API keys
you:Provide audit trails and policy enforcement for AI agent API interactions
you:Manage temporary credentials for autonomous agents with automatic revocation
you:How does Janee keep my keys secure?
you:What MCP tools does Janee provide?

When to choose this

Choose Janee when you're working with multiple AI agents that need API access but you want to maintain security through credential isolation and request auditing.

When NOT to choose this

Don't choose Janee if you need write access to services (currently read-only proxy only), or if you prefer a cloud-based secrets management solution rather than a local-first approach.

Tools this server exposes

5 tools extracted from the README
  • list_services

    Discover available APIs and their policies

  • execute

    Make an API request through Janee (HTTP proxy mode)

  • exec

    Run a CLI command with injected credentials (exec mode)

  • manage_credential

    View, grant, or revoke access to agent-scoped credentials

  • reload_config

    Reload configuration from disk after adding/removing services

Comparable tools

secret-mcphashicorp-vault-mcpaws-secrets-manager

Installation

Installation

npm install -g @true-and-useful/janee

Configuration

janee init
janee add
# Edit ~/.janee/config.yaml with your services
janee serve

Claude Desktop Integration

Add to claude_desktop_config.json:

{
  "mcpServers": {
    "janee": {
      "command": "janee",
      "args": ["serve"]
    }
  }
}

FAQ

How does Janee keep my keys secure?
Janee encrypts keys at rest on your local machine and only injects them into API requests. Agents never see the raw credentials.
What MCP tools does Janee provide?
Janee exposes tools including list_services (discover available APIs), execute (make API requests), exec (run CLI with injected credentials), manage_credential, and reload_config.

On Hacker News

Recent discussion from the developer community.

Compare janee with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.