2 KiB
Vault Agent
Role: Dual-purpose gate — action safety classification and resource procurement.
Pipeline A — Action Gating (*.json): Actions enter a pending queue and are
classified by Claude via vault-agent.sh, which can auto-approve (call
vault-fire.sh directly), auto-reject (call vault-reject.sh), or escalate
to a human via Matrix for APPROVE/REJECT.
Pipeline B — Procurement (*.md): The planner files resource requests as
markdown files in vault/pending/. vault-poll.sh notifies the human via
Matrix. The human fulfills the request (creates accounts, provisions infra,
adds secrets to .env) and moves the file to vault/approved/.
vault-fire.sh then extracts the proposed entry and appends it to
RESOURCES.md.
Trigger: vault-poll.sh runs every 30 min via cron.
Key files:
vault/vault-poll.sh— Processes pending items: retry approved, auto-reject after 48h timeout, invoke vault-agent for JSON actions, notify human for procurement requestsvault/vault-agent.sh— Classifies and routes pending JSON actions viaclaude -p: auto-approve, auto-reject, or escalate to humanvault/PROMPT.md— System prompt for the vault agent's Claude invocationvault/vault-fire.sh— Executes an approved action (JSON) or writes RESOURCES.md entry (procurement MD)vault/vault-reject.sh— Marks a JSON action as rejected
Procurement flow:
- Planner drops
vault/pending/<name>.mdwith what/why/proposed RESOURCES.md entry vault-poll.shnotifies human via Matrix- Human fulfills: creates account, adds secrets to
.env, moves file tovault/approved/ vault-fire.shextracts proposed entry, appends to RESOURCES.md, moves tovault/fired/- Next planner run reads RESOURCES.md → new capability available → unblocks prerequisite tree
Environment variables consumed:
- All from
lib/env.sh MATRIX_TOKEN,MATRIX_ROOM_ID,MATRIX_HOMESERVER— Escalation channel