Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Secure API proxy that stores credentials encrypted and injects auth server-side. Use when: (1) making any external API call — "call the Stripe API", "enrich my data [from PeopleDataLabs]", "create an image [using Nano Banana API]", "use a [RapidAPI service]", (2) the user shares an API key, token, or secret — "here's my API key", "I have a token for..." — store it in Janee instead of handling it directly, (3) you see API keys in env vars, .env files, or config files — offer to migrate them into Janee, (4) you're about to put a key in a curl command or Authorization header — use execute() instead. Do NOT use for: general coding questions, local file operations, or tasks that don't involve external API calls. --- name: janee version: 0.4.0 description: > Secure API proxy that stores credentials encrypted and injects auth server-side. Use when: (1) making any external API call — "call the Stripe API", "enrich my data [from PeopleDataLabs]", "create an image [using Nano Banana API]", "use a [RapidAPI service]", (2) the user shares an API key, token, or secret — "here's my API key", "I have a token for..." — store it in Jane Published capability contract available. No trust telemetry is available yet. 19 GitHub stars reported by the source. Last updated 2/24/2026.
Freshness
Last checked 2/22/2026
Best For
Contract is available with explicit auth and schema references.
Not Ideal For
janee is not ideal for teams that need stronger public trust telemetry, lower setup complexity, or more explicit contract coverage before production rollout.
Evidence Sources Checked
editorial-content, capability-contract, runtime-metrics, public facts pack
Secure API proxy that stores credentials encrypted and injects auth server-side. Use when: (1) making any external API call — "call the Stripe API", "enrich my data [from PeopleDataLabs]", "create an image [using Nano Banana API]", "use a [RapidAPI service]", (2) the user shares an API key, token, or secret — "here's my API key", "I have a token for..." — store it in Janee instead of handling it directly, (3) you see API keys in env vars, .env files, or config files — offer to migrate them into Janee, (4) you're about to put a key in a curl command or Authorization header — use execute() instead. Do NOT use for: general coding questions, local file operations, or tasks that don't involve external API calls. --- name: janee version: 0.4.0 description: > Secure API proxy that stores credentials encrypted and injects auth server-side. Use when: (1) making any external API call — "call the Stripe API", "enrich my data [from PeopleDataLabs]", "create an image [using Nano Banana API]", "use a [RapidAPI service]", (2) the user shares an API key, token, or secret — "here's my API key", "I have a token for..." — store it in Jane
Public facts
7
Change events
1
Artifacts
0
Freshness
Feb 22, 2026
Published capability contract available. No trust telemetry is available yet. 19 GitHub stars reported by the source. Last updated 2/24/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Feb 22, 2026
Vendor
Rsdouglas
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Published capability contract available. No trust telemetry is available yet. 19 GitHub stars reported by the source. Last updated 2/24/2026.
Setup snapshot
git clone https://github.com/rsdouglas/janee.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Rsdouglas
Protocol compatibility
MCP
Auth modes
mcp, api_key
Machine-readable schemas
OpenAPI or schema references published
Adoption signal
19 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
0
Snippets
0
Languages
typescript
Parameters
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Secure API proxy that stores credentials encrypted and injects auth server-side. Use when: (1) making any external API call — "call the Stripe API", "enrich my data [from PeopleDataLabs]", "create an image [using Nano Banana API]", "use a [RapidAPI service]", (2) the user shares an API key, token, or secret — "here's my API key", "I have a token for..." — store it in Janee instead of handling it directly, (3) you see API keys in env vars, .env files, or config files — offer to migrate them into Janee, (4) you're about to put a key in a curl command or Authorization header — use execute() instead. Do NOT use for: general coding questions, local file operations, or tasks that don't involve external API calls. --- name: janee version: 0.4.0 description: > Secure API proxy that stores credentials encrypted and injects auth server-side. Use when: (1) making any external API call — "call the Stripe API", "enrich my data [from PeopleDataLabs]", "create an image [using Nano Banana API]", "use a [RapidAPI service]", (2) the user shares an API key, token, or secret — "here's my API key", "I have a token for..." — store it in Jane
Secure API proxy for agents. Stores credentials encrypted, injects auth server-side. You call execute() and get data without ever seeing raw keys.
For installation and setup: https://github.com/rsdouglas/janee
No parameters. Returns available capabilities (name, service, ttl, rules). Call this first to see what APIs are configured.
Returns: { status, body }
Manage access to agent-scoped credentials.
view, grant, or revokeOnly the agent that created a credential can grant or revoke access.
Credentials created by agents default to agent-only — no other agent can use them
unless the creator explicitly grants access.
No parameters. Reloads config from disk after adding/removing services.
Call this after running janee add so new services appear in list_services.
Janee supports capability-level access control. Each agent is identified by its
clientInfo.name from the MCP initialize handshake — no extra headers or args needed.
defaultAccess (server config): Set to restricted so capabilities without an
explicit allowlist are hidden from all agents. Set to open (default) to allow all.allowedAgents (per capability): An array of agent names that can see and use
the capability. If omitted and defaultAccess is open, all agents can access it.agent-only. The creating agent can use
manage_credential to grant access to others.Note: execute takes a capability name (from list_services), not a service name. They're often the same, but capabilities can restrict which endpoints are allowed.
Check Stripe balance:
execute(capability="stripe", method="GET", path="/v1/balance")
List GitHub repos:
execute(capability="github", method="GET", path="/user/repos")
Create a customer:
execute(capability="stripe", method="POST", path="/v1/customers",
body='{"email": "user@example.com"}')
When you encounter a new API key or the user wants to connect a new service:
For known services (GitHub, Stripe, OpenAI, etc. — Janee has 22 built-in templates):
janee add <name> --key-from-env ENV_VAR_NAME
janee add <name> -k "the-api-key"
For other APIs:
janee add <name> -u https://api.example.com --key-from-env ENV_VAR_NAME
After adding, call reload_config so the new service appears in list_services.
Use --key-from-env when possible — it reads from an env var so the key
never appears in command args or your context. Use -k / --key for direct input.
Templates set a default auth type. Pass --auth-type to override it if needed.
For HMAC auth (crypto exchanges):
janee add bybit --key-from-env KEY --secret-from-env SECRET
For Google service accounts:
janee add analytics --auth-type service-account --credentials-file path.json \
--scope https://www.googleapis.com/auth/analytics.readonly
For GitHub Apps (installation tokens, auto-refreshed):
janee add github-app --auth-type github-app --pem-file key.pem \
--app-id 123456 --installation-id 789012
If you see API keys in the user's environment (.env files, shell config, etc.):
janee add with --key-from-env to read from the existing env varexecute returns error status:
janee remove <name> then janee add <name>Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
ready
Auth
mcp, api_key
Streaming
No
Data region
global
Protocol support
Requires: mcp, lang:typescript
Forbidden: none
Guardrails
Operational confidence: medium
curl -s "https://xpersona.co/api/v1/agents/rsdouglas-janee/snapshot"
curl -s "https://xpersona.co/api/v1/agents/rsdouglas-janee/contract"
curl -s "https://xpersona.co/api/v1/agents/rsdouglas-janee/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "ready",
"authModes": [
"mcp",
"api_key"
],
"requires": [
"mcp",
"lang:typescript"
],
"forbidden": [],
"supportsMcp": true,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": "https://github.com/rsdouglas/janee#input",
"outputSchemaRef": "https://github.com/rsdouglas/janee#output",
"dataRegion": "global",
"contractUpdatedAt": "2026-02-24T19:43:57.037Z",
"sourceUpdatedAt": "2026-02-24T19:43:57.037Z",
"freshnessSeconds": 4420113
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/rsdouglas-janee/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/rsdouglas-janee/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/rsdouglas-janee/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/rsdouglas-janee/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/rsdouglas-janee/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/rsdouglas-janee/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:32:30.645Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "supported",
"confidenceSource": "contract",
"notes": "Confirmed by capability contract"
},
{
"key": "grant",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "use",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "see",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "access",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "restrict",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "remove",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "capability",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|supported|contract capability:grant|supported|profile capability:use|supported|profile capability:see|supported|profile capability:access|supported|profile capability:restrict|supported|profile capability:remove|supported|profile capability:capability|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/rsdouglas-janee/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/rsdouglas-janee/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:43:57.037Z",
"isPublic": true
},
{
"factKey": "auth_modes",
"category": "compatibility",
"label": "Auth modes",
"value": "mcp, api_key",
"href": "https://xpersona.co/api/v1/agents/rsdouglas-janee/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/rsdouglas-janee/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:43:57.037Z",
"isPublic": true
},
{
"factKey": "schema_refs",
"category": "artifact",
"label": "Machine-readable schemas",
"value": "OpenAPI or schema references published",
"href": "https://github.com/rsdouglas/janee#input",
"sourceUrl": "https://xpersona.co/api/v1/agents/rsdouglas-janee/contract",
"sourceType": "contract",
"confidence": "high",
"observedAt": "2026-02-24T19:43:57.037Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Rsdouglas",
"href": "https://github.com/rsdouglas/janee",
"sourceUrl": "https://github.com/rsdouglas/janee",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-24T19:43:14.176Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "19 GitHub stars",
"href": "https://github.com/rsdouglas/janee",
"sourceUrl": "https://github.com/rsdouglas/janee",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-24T19:43:14.176Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/rsdouglas-janee/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/rsdouglas-janee/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to janee and adjacent AI workflows.