Is controlled remote script execution a useful addition, and which integration approach? #1364
StuartJMackintosh
started this conversation in
General
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm new to the NanoClaw community and would like to know if integrating a controlled execution tool I've built would add value here.
The tool is ctrl-exec (ctrl-exec.io). It consists of a server (the dispatcher, which exposes an HTTP API and CLI) and lightweight agents installed on remote hosts - tested on Debian and OpenWrt, should run on any Linux distribution. Agents are paired once with the server to establish a mutual mTLS trust relationship.
What can be executed on a remote host is strictly allowlisted. Auth hooks run on both the server and agent sides, so authority to invoke a specific action can be withdrawn at any point. The hook receives the full request context, so fine-grained policy is straightforward. All activity is recorded in syslog on both sides.
There is a dynamic discovery API - when new scripts are added to a paired host, they become visible through the dispatcher API automatically.
For NanoClaw, the integration topology I have in mind is that the dispatcher component running as a sidecar container alongside the NanoClaw agent container. NanoClaw would have full API access but cannot tamper with the remote host's allowlist or auth configuration.
Alternatively, the dispatcher could be installed directly into the NanoClaw container as a skill - more tightly integrated but a weaker security boundary. I want to understand what integration patterns people here are actually using before exploring integration further.
Two questions:
Beta Was this translation helpful? Give feedback.
All reactions