Give your AI agents the minimum permission they need. No more, no less.
git clone https://github.com/iamGodofall/capkit.git
cd capkit
npm install
npm run demo # See it work!Current AI agents have root access to your systems. One prompt injection = disaster.
CapKit issues cryptographically signed, time-bound capabilities:
- ✅ Scoped:
postto/twitter, not delete - ✅ Time-bound: Expires in 10min
- ✅ Signed: HMAC-SHA256 verification
- ✅ Auditable: Every action logged
- ✅ Zero deps: Sovereign-first (Node crypto only)
Threat Model:
1. Agent prompt injection → Capability stays scoped
2. Key compromise → Time-bound limits damage
3. Network failure → Works offline
4. Malicious actor → HMAC prevents tampering
npm install capkitimport { issueCapability, verifyCapability, checkPolicy } from 'capkit';
// Issue scoped permission
const cap = issueCapability({
action: 'post',
resource: '/twitter',
key: 'your-secret-key',
expiresIn: '10m'
});
// Agent uses capability
if (verifyCapability({ capability: cap, key: 'your-secret-key' }).valid) {
console.log('✅ Agent authorized');
}Part of the Agent Builder Suite
→ capkit: Scoped capabilities for agents
→ quickbench: Reproducible agent evaluation
→ edge-run: Offline-first orchestration (coming soon)
→ connector-starter: Generate adapters fast (coming soon)
Built for builders who ship. MIT licensed. Local-first by design.
MIT