Skip to main content
Glama

q-ring

The first quantum-inspired keyring built specifically for AI coding agents.

NPM Version Docs MCP Tools License

Stop pasting API keys into plain-text .env files or wrestling with clunky secret managers. q-ring securely anchors your credentials to your OS's native vault (macOS Keychain, Linux Secret Service, Windows Credential Vault) and supercharges them with mechanics from quantum physics.

๐Ÿ“– View the Official Documentation for a complete CLI reference, MCP prompt cookbooks, and architecture details.

Why q-ring?

  • Superposition: Store one key with multiple states (dev/staging/prod) that collapse based on context.

  • Entanglement: Link keys across projects so rotating one automatically updates them all.

  • Tunneling: Create ephemeral, in-memory secrets that self-destruct after a set time or read count.

  • Teleportation: Securely pack and share AES-256-GCM encrypted secret bundles.

  • Seamless AI Integration: 44 built-in MCP tools for native use in Cursor, Kiro, and Claude Code.

๐Ÿš€ Installation

q-ring is designed to be installed globally so it's available anywhere in your terminal. Pick your favorite package manager:

# pnpm (recommended)
pnpm add -g @i4ctime/q-ring

# npm
npm install -g @i4ctime/q-ring

# yarn
yarn global add @i4ctime/q-ring

# Homebrew (macOS / Linux)
brew install i4ctime/tap/qring

โšก Quick Start

# 1๏ธโƒฃ Store a secret (prompts securely if value is omitted)
qring set OPENAI_API_KEY sk-...

# 2๏ธโƒฃ Retrieve it anytime
qring get OPENAI_API_KEY

# 3๏ธโƒฃ List all keys (values are never shown)
qring list

# 4๏ธโƒฃ Generate a cryptographic secret and save it
qring generate --format api-key --prefix "sk-" --save MY_KEY

# 5๏ธโƒฃ Run a full health scan
qring health

Quantum Features

Superposition โ€” One Key, Multiple Environments

A single secret can hold different values for dev, staging, and prod simultaneously. The correct value resolves based on your current context.

# Set environment-specific values
qring set API_KEY "sk-dev-123" --env dev
qring set API_KEY "sk-stg-456" --env staging
qring set API_KEY "sk-prod-789" --env prod

# Value resolves based on context
QRING_ENV=prod qring get API_KEY   # โ†’ sk-prod-789
QRING_ENV=dev  qring get API_KEY   # โ†’ sk-dev-123

# Inspect the quantum state
qring inspect API_KEY

Wavefunction Collapse โ€” Smart Environment Detection

q-ring auto-detects your environment without explicit flags. Resolution order:

  1. --env flag

  2. QRING_ENV environment variable

  3. NODE_ENV environment variable

  4. Git branch heuristics (main/master โ†’ prod, develop โ†’ dev)

  5. .q-ring.json project config

  6. Default environment from the secret

# See what environment q-ring detects
qring env

# Project config (.q-ring.json)
echo '{"env": "staging", "branchMap": {"release/*": "staging"}}' > .q-ring.json

Quantum Decay โ€” Secrets with TTL

Secrets can have a time-to-live. Expired secrets are blocked from reads. Stale secrets (75%+ lifetime) trigger warnings.

# Set a secret that expires in 1 hour
qring set SESSION_TOKEN "tok-..." --ttl 3600

# Set with explicit expiry
qring set CERT_KEY "..." --expires "2026-06-01T00:00:00Z"

# Health check shows decay status
qring health

Observer Effect โ€” Audit Everything

Every secret read, write, and delete is logged with a tamper-evident hash chain. Access patterns are tracked for anomaly detection.

# View audit log
qring audit
qring audit --key OPENAI_KEY --limit 50

# Detect anomalies (burst access, unusual hours, chain tampering)
qring audit --anomalies

# Verify audit chain integrity
qring audit:verify

# Export audit log
qring audit:export --format json --since 2026-03-01
qring audit:export --format csv --output audit-report.csv

Quantum Noise โ€” Secret Generation

Generate cryptographically strong secrets in common formats.

qring generate                          # API key (default)
qring generate --format password -l 32  # Strong password
qring generate --format uuid            # UUID v4
qring generate --format token           # Base64url token
qring generate --format hex -l 64       # 64-byte hex
qring generate --format api-key --prefix "sk-live-" --save STRIPE_KEY

Entanglement โ€” Linked Secrets

Link secrets across projects. When you rotate one, all entangled copies update automatically.

# Entangle two secrets
qring entangle API_KEY API_KEY_BACKUP

# Now updating API_KEY also updates API_KEY_BACKUP
qring set API_KEY "new-value"

# Unlink entangled secrets
qring disentangle API_KEY API_KEY_BACKUP

Tunneling โ€” Ephemeral Secrets

Create secrets that exist only in memory. They never touch disk. Optional TTL and max-read self-destruction.

# Create an ephemeral secret (returns tunnel ID)
qring tunnel create "temporary-token-xyz" --ttl 300 --max-reads 1

# Read it (self-destructs after this read)
qring tunnel read tun_abc123

# List active tunnels
qring tunnel list

Teleportation โ€” Encrypted Sharing

Pack secrets into AES-256-GCM encrypted bundles for secure transfer between machines.

# Pack secrets (prompts for passphrase)
qring teleport pack --keys "API_KEY,DB_PASS" > bundle.txt

# On another machine: unpack (prompts for passphrase)
cat bundle.txt | qring teleport unpack

# Preview without importing
qring teleport unpack <bundle> --dry-run

Import โ€” Bulk Secret Ingestion

Import secrets from .env files directly into q-ring. Supports standard dotenv syntax including comments, quoted values, and escape sequences.

# Import all secrets from a .env file
qring import .env

# Import to project scope, skipping existing keys
qring import .env --project --skip-existing

# Preview what would be imported
qring import .env --dry-run

Selective Export

Export only the secrets you need using key names or tag filters.

# Export specific keys
qring export --keys "API_KEY,DB_PASS,REDIS_URL"

# Export by tag
qring export --tags "backend"

# Combine with format
qring export --keys "API_KEY,DB_PASS" --format json

Secret Search and Filtering

Filter qring list output by tag, expiry state, or key pattern.

# Filter by tag
qring list --tag backend

# Show only expired secrets
qring list --expired

# Show only stale secrets (75%+ decay)
qring list --stale

# Glob pattern on key name
qring list --filter "API_*"

Project Secret Manifest

Declare required secrets in .q-ring.json and validate project readiness with a single command.

# Validate project secrets against the manifest
qring check

# See which secrets are present, missing, expired, or stale
qring check --project-path /path/to/project

Env File Sync

Generate a .env file from the project manifest, resolving each key from q-ring with environment-aware superposition collapse.

# Generate to stdout
qring env:generate

# Write to a file
qring env:generate --output .env

# Force a specific environment
qring env:generate --env staging --output .env.staging

Secret Liveness Validation

Test if a secret is actually valid with its target service. q-ring auto-detects the provider from key prefixes (sk- โ†’ OpenAI, ghp_ โ†’ GitHub, etc.) or accepts an explicit provider name.

# Validate a single secret
qring validate OPENAI_API_KEY

# Force a specific provider
qring validate SOME_KEY --provider stripe

# Validate all secrets with detectable providers
qring validate --all

# Only validate manifest-declared secrets
qring validate --all --manifest

# List available providers
qring validate --list-providers

Built-in providers: OpenAI, Stripe, GitHub, AWS (format check), Generic HTTP.

Output:

  โœ“ OPENAI_API_KEY   valid    (openai, 342ms)
  โœ— STRIPE_KEY       invalid  (stripe, 128ms) โ€” API key has been revoked
  โš  AWS_ACCESS_KEY   error    (aws, 10002ms) โ€” network timeout
  โ—‹ DATABASE_URL     unknown  โ€” no provider detected

Hooks โ€” Callbacks on Secret Change

Register webhooks, shell commands, or process signals that fire when secrets are created, updated, or deleted. Supports key matching, glob patterns, tag filtering, and scope constraints.

# Run a shell command when a secret changes
qring hook add --key DB_PASS --exec "docker restart app"

# POST to a webhook on any write/delete
qring hook add --key API_KEY --url "https://hooks.example.com/rotate"

# Trigger on all secrets tagged "backend"
qring hook add --tag backend --exec "pm2 restart all"

# Signal a process when DB secrets change
qring hook add --key-pattern "DB_*" --signal-target "node"

# List all hooks
qring hook list

# Remove a hook
qring hook remove <id>

# Enable/disable
qring hook enable <id>
qring hook disable <id>

# Dry-run test a hook
qring hook test <id>

Hooks are fire-and-forget: a failing hook never blocks secret operations. The hook registry is stored at ~/.config/q-ring/hooks.json.

SSRF protection: HTTP hook URLs targeting private/loopback IP ranges (127.0.0.0/8, 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 169.254.0.0/16, ::1, fc00::/7) are blocked by default. DNS resolution is checked before the request is sent. To allow hooks targeting local services (e.g. during development), set the environment variable Q_RING_ALLOW_PRIVATE_HOOKS=1.

Configurable Rotation

Set a rotation format per secret so the agent auto-rotates with the correct value shape.

# Store a secret with rotation format metadata
qring set STRIPE_KEY "sk-..." --rotation-format api-key --rotation-prefix "sk-"

# Store a password with password rotation format
qring set DB_PASS "..." --rotation-format password

Secure Execution & Auto-Redaction

Run commands with secrets securely injected into the environment. All known secret values are automatically redacted from stdout and stderr to prevent leaking into terminal logs or agent transcripts. Exec profiles restrict which commands may be run.

# Execute a deployment script with secrets injected
qring exec -- npm run deploy

# Inject only specific tags
qring exec --tags backend -- node server.js

# Run with a restricted profile (blocks curl/wget/ssh, 30s timeout)
qring exec --profile restricted -- npm test

Codebase Secret Scanner

Migrating a legacy codebase? Quickly scan directories for hardcoded credentials using regex heuristics and Shannon entropy analysis.

# Scan current directory
qring scan .

Output:

  โœ— src/db/connection.js:12
    Key:     DB_PASSWORD
    Entropy: 4.23
    Context: const DB_PASSWORD = "..."

Composite / Templated Secrets

Store complex connection strings that dynamically resolve other secrets. If DB_PASS rotates, DB_URL is automatically correct without manual updates.

qring set DB_USER "admin"
qring set DB_PASS "supersecret"
qring set DB_URL "postgres://{{DB_USER}}:{{DB_PASS}}@localhost/mydb"

# Resolves embedded templates automatically
qring get DB_URL 
# Output: postgres://admin:supersecret@localhost/mydb

User Approvals (Zero-Trust Agent)

Protect sensitive production secrets from being read autonomously by the MCP server without explicit user approval. Each approval token is HMAC-verified, scoped, reasoned, and time-limited.

# Mark a secret as requiring approval
qring set PROD_DB_URL "..." --requires-approval

# Temporarily grant MCP access for 1 hour with a reason
qring approve PROD_DB_URL --for 3600 --reason "deploying v2.0"

# List all approvals with verification status
qring approvals

# Revoke an approval
qring approve PROD_DB_URL --revoke

Just-In-Time (JIT) Provisioning

Instead of storing static credentials, configure q-ring to dynamically generate short-lived tokens on the fly when requested (e.g. AWS STS, generic HTTP endpoints).

# Store the STS role configuration
qring set AWS_TEMP_KEYS '{"roleArn":"arn:aws:iam::123:role/AgentRole", "durationSeconds":3600}' --jit-provider aws-sts

# Resolving the secret automatically assumes the role and caches the temporary token
qring get AWS_TEMP_KEYS

Project Context for AI Agents

A safe, redacted overview of the project's secrets, configuration, and state. Designed to be fed into an AI agent's system prompt without ever exposing secret values.

# Human-readable summary
qring context

# JSON output (for MCP / programmatic use)
qring context --json

Secret-Aware Linter

Scan specific files for hardcoded secrets with optional auto-fix. When --fix is used, detected secrets are replaced with process.env.KEY references and stored in q-ring.

# Lint files for hardcoded secrets
qring lint src/config.ts src/db.ts

# Auto-fix: replace hardcoded values and store in q-ring
qring lint src/config.ts --fix

# Scan entire directory with auto-fix
qring scan . --fix

Agent Memory

Encrypted, persistent key-value store that survives across AI agent sessions. Useful for remembering rotation history, project decisions, or context.

# Store a memory
qring remember last_rotation "Rotated STRIPE_KEY on 2026-03-21"

# Retrieve it
qring recall last_rotation

# List all memories
qring recall

# Forget
qring forget last_rotation

Pre-Commit Secret Scanning

Install a git pre-commit hook that automatically blocks commits containing hardcoded secrets.

# Install the hook
qring hook:install

# Uninstall
qring hook:uninstall

Secret Analytics

Analyze usage patterns and get optimization suggestions for your secrets.

qring analyze

Output includes most accessed secrets, unused/stale secrets, scope optimization suggestions, and rotation recommendations.

Service Setup Wizard

Quickly set up a new service integration with secrets, manifest entries, and hooks in one command.

# Create secrets for a new Stripe integration
qring wizard stripe --keys STRIPE_KEY,STRIPE_SECRET --provider stripe --tags payment

# With a hook to restart the app on change
qring wizard myservice --hook-exec "pm2 restart app"

Governance Policy

Define project-level governance rules in .q-ring.json to control which MCP tools can be used, which keys are accessible, and which commands can be executed. Policy is enforced at both the MCP server and keyring level.

# View the active policy
qring policy

# JSON output
qring policy --json

Example policy in .q-ring.json:

{
  "policy": {
    "mcp": {
      "denyTools": ["delete_secret"],
      "deniedKeys": ["PROD_DB_PASSWORD"],
      "deniedTags": ["production"]
    },
    "exec": {
      "denyCommands": ["curl", "wget", "ssh"],
      "maxRuntimeSeconds": 30
    },
    "secrets": {
      "requireApprovalForTags": ["production"],
      "maxTtlSeconds": 86400
    }
  }
}

Exec Profiles

Restrict command execution with named profiles that control allowed commands, network access, timeouts, and environment sanitization.

# Run with the "restricted" profile (blocks curl, wget, ssh; 30s timeout)
qring exec --profile restricted -- npm test

# Run with the "ci" profile (5min timeout, allows network)
qring exec --profile ci -- npm run deploy

# Default: unrestricted
qring exec -- echo "hello"

Built-in profiles: unrestricted, restricted (no network tools, 30s limit), ci (5min limit, blocks destructive commands).

Tamper-Evident Audit

Every audit event includes a SHA-256 hash of the previous event, creating a tamper-evident chain. Verify integrity and export logs in multiple formats.

# Verify the entire audit chain
qring audit:verify

# Export as JSON
qring audit:export --format json --since 2026-03-01

# Export as CSV
qring audit:export --format csv --output audit-report.csv

Team & Org Scopes

Extend beyond global and project scopes with team and org scopes for shared secrets across groups. Resolution order: project โ†’ team โ†’ org โ†’ global (most specific wins).

# Store a secret in team scope
qring set SHARED_API_KEY "sk-..." --team my-team

# Store in org scope
qring set ORG_LICENSE "lic-..." --org acme-corp

# Resolution cascades: project > team > org > global
qring get API_KEY --team my-team --org acme-corp

Issuer-Native Rotation

Attempt provider-native secret rotation (for providers that support it) or fall back to local generation.

# Rotate via the detected provider
qring rotate STRIPE_KEY

# Force a specific provider
qring rotate API_KEY --provider openai

CI Secret Validation

Batch-validate all secrets against their providers in a CI-friendly mode. Returns a structured pass/fail report with exit code 1 on failure.

# Validate all secrets (CI mode)
qring ci:validate

# JSON output for pipeline parsing
qring ci:validate --json

Agent Mode โ€” Autonomous Monitoring

A background daemon that continuously monitors secret health, detects anomalies, and optionally auto-rotates expired secrets.

# Start the agent
qring agent --interval 60 --verbose

# With auto-rotation of expired secrets
qring agent --auto-rotate

# Single scan (for CI/cron)
qring agent --once

Quantum Status Dashboard โ€” Live Monitoring

Launch a real-time dashboard in your browser that turns the entire quantum subsystem into one glanceable page. The dashboard is a single self-contained HTML page served locally โ€” no dependencies, no cloud, no config โ€” and streams updates every 5 seconds via Server-Sent Events while preserving search input and scroll position across ticks.

What you get:

  • KPI strip โ€” total secrets, detected environment, protected count, active approvals, hooks, 24-hour reads, and live anomaly count.

  • Health summary โ€” donut chart of healthy / stale / expired / no-decay secrets plus per-scope counts (global / project / team / org).

  • Environment โ€” wavefunction collapse details: detected env, source, branch, and any project context.

  • Manifest โ€” .q-ring.json summary with declared / required / missing / expired / stale keys.

  • Policy โ€” at-a-glance view of MCP, exec, and secret policies (allow/deny tools, deny keys/tags, allow/deny commands, approval & rotation requirements).

  • Secrets table โ€” searchable, sortable view of every secret (key, scope, env, type, decay, tags, last read), with quick chips for expired, stale, and protected filters. Press / to focus the search box.

  • Quantum cards โ€” decay timers, superposition states, entanglement pairs, and active quantum tunnels.

  • Approvals & hooks โ€” live list of valid (and tampered) approval grants and every registered hook with its match summary.

  • Agent memory โ€” count of encrypted memory keys persisted at ~/.config/q-ring/agent-memory.enc.

  • Anomaly alerts โ€” burst reads, off-hours access, tampered audit chain, and other suspicious patterns.

  • Audit log (24h) โ€” filterable feed with action chips (read/write/delete/export), source chips (cli/mcp/hook/agent), and a free-text filter.

Top-bar controls let you pause SSE updates (handy while reading the audit feed), refresh on demand, or jump to the raw JSON snapshot at /api/status. Keyboard shortcuts: / focus secrets search ยท P pause ยท R refresh.

# Open the dashboard (auto-launches your browser)
qring status

# Specify a custom port
qring status --port 4200

# Don't auto-open the browser
qring status --no-open

MCP Server

q-ring includes a full MCP server with 44 tools for AI agent integration.

Core Tools

Tool

Description

get_secret

Read a secret value (collapses superposition, audits the read)

list_secrets

List keys + metadata in scope (values never exposed); filter by tag, expiry, glob

set_secret

Create or overwrite a single secret with optional TTL, per-env state, tags, rotation format

delete_secret

Permanently remove a secret value (not undoable from q-ring)

has_secret

Boolean existence check that respects decay (no audit read)

export_secrets

Render multiple secrets as .env or JSON for one-off export

import_dotenv

Parse .env text and bulk-store every key/value pair

check_project

Compare .q-ring.json manifest against the keyring for missing/expired/stale keys

env_generate

Render a complete .env body from the project manifest, with warnings for gaps

Quantum Tools

Tool

Description

inspect_secret

Show metadata for one key (states, decay, entanglement, access count) without revealing the value

detect_environment

Resolve which env slug should drive superposition collapse for the current context

generate_secret

Generate a CSPRNG-backed value in a chosen format and optionally store it

entangle_secrets

Link two keys so future writes/rotations propagate the same value

disentangle_secrets

Break the sync link between two keys (does not delete values)

Tunneling Tools

Tool

Description

tunnel_create

Stash a value in process memory and return an opaque ID (never touches disk)

tunnel_read

Fetch a tunneled value by ID โ€” may self-destruct on read

tunnel_list

Enumerate active tunnels with remaining read budget and TTL (IDs only)

tunnel_destroy

Immediately remove a tunnel from memory before its TTL/reads run out

Teleportation Tools

Tool

Description

teleport_pack

Encrypt selected secrets into a passphrase-protected AES-256-GCM bundle

teleport_unpack

Decrypt a teleport bundle and import each secret (with optional dry-run)

Validation Tools

Tool

Description

validate_secret

Hit the upstream service (OpenAI/Stripe/GitHub/AWS/HTTP) to confirm a single key is still live

list_providers

Enumerate built-in validation providers and their auto-detect prefixes

Hook Tools

Tool

Description

register_hook

Register a shell/HTTP/signal side-effect that fires on write/delete/rotate

list_hooks

Show every registered hook with match criteria, type, and enabled flag

remove_hook

Detach a single hook by ID without touching any secrets

Execution & Scanning Tools

Tool

Description

exec_with_secrets

Run a child command with secrets injected as env vars and any leaked values redacted from output

scan_codebase_for_secrets

Walk a directory tree and flag hardcoded secrets via regex + entropy heuristics

lint_files

Inspect a specific file list for hardcoded secrets with optional auto-fix to process.env.KEY

AI Agent Tools

Tool

Description

get_project_context

Single redacted snapshot of secrets, env, manifest, hooks, and recent audit activity

agent_remember

Persist a non-secret note in encrypted agent memory across sessions

agent_recall

Read a memory value, or list every stored key when no key is supplied

agent_forget

Permanently delete a key from agent memory

analyze_secrets

Usage profile: most-accessed, stale, never-accessed, no-rotation candidates

Observer & Health Tools

Tool

Description

audit_log

Query the tamper-evident audit log filtered by key, action, and limit

detect_anomalies

Surface burst-read and off-hours findings from audit history

verify_audit_chain

Recompute the audit hash chain and report the first break point if tampered

export_audit

Export audit events as jsonl, json, or csv for archival/SIEM

health_check

Read-only scope sweep: decay/stale/expired counts plus current anomalies

status_dashboard

Start a local SSE dashboard with live KPIs, secrets, hooks, and audit feed

agent_scan

Multi-project health pass with optional autoRotate for expired secrets

Governance & Policy Tools

Tool

Description

check_policy

Dry-run a tool/key/exec action against .q-ring.json policy without performing it

get_policy_summary

High-level overview of policy rule counts and approval/rotation requirements

rotate_secret

Ask the upstream provider to issue a new credential and store it back in the keyring

ci_validate_secrets

Batch-validate every accessible secret in scope and return a structured pass/fail report

Cursor / Kiro Configuration

Add to .cursor/mcp.json or .kiro/mcp.json:

If q-ring is installed globally (e.g. pnpm add -g @i4ctime/q-ring):

{
  "mcpServers": {
    "q-ring": {
      "command": "qring-mcp"
    }
  }
}

If using a local clone:

{
  "mcpServers": {
    "q-ring": {
      "command": "node",
      "args": ["/path/to/quantum_ring/dist/mcp.js"]
    }
  }
}

Claude Code Configuration

Add to ~/.claude/claude_desktop_config.json:

Global install:

{
  "mcpServers": {
    "q-ring": {
      "command": "qring-mcp"
    }
  }
}

Local clone:

{
  "mcpServers": {
    "q-ring": {
      "command": "node",
      "args": ["/path/to/quantum_ring/dist/mcp.js"]
    }
  }
}

Editor Plugins

The q-ring repo ships three first-party editor packs โ€” each one adds rules/steering, agents, commands, skills, hooks, and the MCP connector to its host editor.

Plugin

Editor

Highlights

cursor-plugin/

Cursor

3 rules, 5 skills, 2 agents, 8 slash commands, 3 hooks, MCP autoconnect

kiro-plugin/

Kiro

Official Power layout: POWER.md, root mcp.json, steering/, hooks/; or flatten with plugin:sync:kiro

claude-code-plugin/

Claude Code

CLAUDE.md memory, project .mcp.json, 2 subagents, 8 slash commands, 5 skills, 3 hook scripts

Cursor Plugin

The q-ring Cursor Plugin brings quantum secret management directly into your IDE with rules, skills, agents, commands, hooks, and a built-in MCP connector.

Component

What it does

3 Rules

Always-on guidance: never hardcode secrets, use q-ring for all ops, warn about .env files

5 Skills

Auto-triggered by context: secret management, scanning, rotation, project onboarding, exec-with-secrets

2 Agents

security-auditor (proactive monitoring) and secret-ops (day-to-day assistant)

8 Commands

/qring:scan-secrets, /qring:health-check, /qring:rotate-expired, /qring:setup-project, /qring:teleport-secrets, /qring:dashboard, /qring:exec-safe, /qring:analyze

3 Hooks

afterFileEdit (lint scan), sessionStart (project context), beforeShellExecution (.env guard)

MCP Connector

Auto-connects to qring-mcp via stdio โ€” all 44 tools available

Install from the Cursor marketplace or see cursor-plugin/README.md for manual setup.

Kiro Plugin (Power)

The kiro-plugin/ directory is a Kiro Power per Create powers: POWER.md (metadata, onboarding, steering map), root mcp.json (MCP server must match the server name referenced in the power), and steering/ for workflows. Install from Kiro โ†’ Powers โ†’ Add power from Local Path and select kiro-plugin, or publish the folder on GitHub and use Add power from GitHub.

Always-on steering blocks hardcoded secrets and routes everything through q-ring; manual steering files act as agent personas (#qring-secret-ops, #qring-security-auditor), skill packs, and slash-style commands (#qring-cmd-scan-secrets, etc.). Optional hooks live in hooks/ for copy into .kiro/hooks/.

# Alternative: flatten into ~/.kiro (settings + steering + hooks)
pnpm run plugin:sync:kiro

# Or scope to a single project
pnpm run plugin:sync:kiro -- /path/to/your/project/.kiro

See kiro-plugin/README.md for the full breakdown.

Claude Code Plugin

For Claude Code, q-ring ships a CLAUDE.md memory file, a project-scoped .mcp.json, two subagents (secret-ops, security-auditor), eight slash commands (/qring-scan-secrets, /qring-health-check, โ€ฆ), five skills, and three hooks (post-edit lint reminder, pre-Bash .env guard, session-start context primer).

# Install into the current project ($PWD)
pnpm run plugin:sync:claude

# Install agents/commands/skills/hooks at user scope (~/.claude)
pnpm run plugin:sync:claude -- --user

# Or target a specific project
pnpm run plugin:sync:claude -- /path/to/your/project

Existing CLAUDE.md, .mcp.json, or .claude/settings.json files are never silently overwritten โ€” the script writes a <filename>.qring-template next to them so you can merge by hand. Pass --force to overwrite.

See claude-code-plugin/README.md for the full breakdown.

Architecture

qring CLI โ”€โ”€โ”€โ”€โ”€โ”
               โ”œโ”€โ”€โ–ถ Core Engine โ”€โ”€โ–ถ @napi-rs/keyring โ”€โ”€โ–ถ OS Keyring
MCP Server โ”€โ”€โ”€โ”€โ”˜       โ”‚
                       โ”œโ”€โ”€ Envelope (quantum metadata)
                       โ”œโ”€โ”€ Scope Resolver (global / project / team / org)
                       โ”œโ”€โ”€ Collapse (env detection + branchMap globs)
                       โ”œโ”€โ”€ Observer (tamper-evident audit chain)
                       โ”œโ”€โ”€ Policy (governance-as-code engine)
                       โ”œโ”€โ”€ Noise (secret generation)
                       โ”œโ”€โ”€ Entanglement (cross-secret linking)
                       โ”œโ”€โ”€ Validate (provider-based liveness + rotation)
                       โ”œโ”€โ”€ Hooks (shell/HTTP/signal callbacks)
                       โ”œโ”€โ”€ Import (.env file ingestion)
                       โ”œโ”€โ”€ Exec (profile-restricted injection + redaction)
                       โ”œโ”€โ”€ Scan (codebase entropy heuristics)
                       โ”œโ”€โ”€ Provision (JIT ephemeral credentials)
                       โ”œโ”€โ”€ Approval (HMAC-verified zero-trust tokens)
                       โ”œโ”€โ”€ Context (safe redacted project view)
                       โ”œโ”€โ”€ Linter (secret-aware code scanning)
                       โ”œโ”€โ”€ Memory (encrypted agent persistence)
                       โ”œโ”€โ”€ Tunnel (ephemeral in-memory)
                       โ”œโ”€โ”€ Teleport (encrypted sharing)
                       โ”œโ”€โ”€ Agent (autonomous monitor + rotation)
                       โ””โ”€โ”€ Dashboard (live status via SSE)

Project Config (.q-ring.json)

Optional per-project configuration:

{
  "env": "dev",
  "defaultEnv": "dev",
  "branchMap": {
    "main": "prod",
    "develop": "dev",
    "staging": "staging",
    "release/*": "staging",
    "feature/*": "dev"
  },
  "secrets": {
    "OPENAI_API_KEY": { "required": true, "description": "OpenAI API key", "format": "api-key", "prefix": "sk-", "provider": "openai" },
    "DATABASE_URL": { "required": true, "description": "Postgres connection string", "validationUrl": "https://api.example.com/health" },
    "SENTRY_DSN": { "required": false, "description": "Sentry error tracking" }
  },
  "policy": {
    "mcp": {
      "denyTools": ["delete_secret"],
      "deniedKeys": ["PROD_DB_PASSWORD"],
      "deniedTags": ["production"]
    },
    "exec": {
      "denyCommands": ["curl", "wget"],
      "maxRuntimeSeconds": 60
    }
  }
}
  • branchMap supports glob patterns with * wildcards (e.g., release/* matches release/v1.0)

  • secrets declares the project's required secrets โ€” use qring check to validate, qring env:generate to produce a .env file

  • provider associates a liveness validation provider with a secret (e.g., "openai", "stripe", "github") โ€” use qring validate to test

  • validationUrl configures the generic HTTP provider's endpoint for custom validation

  • policy defines governance rules for MCP tool gating, key access restrictions, exec allowlists, and secret lifecycle requirements

Contributing

  • Run pnpm run lint, pnpm run typecheck, and pnpm run test:ci before opening a PR.

  • Tests or sandboxes can point the audit log elsewhere with QRING_AUDIT_DIR (directory is created if missing); default is ~/.config/q-ring/audit.jsonl.

  • Optional local pre-commit: qring hook:install (uses this packageโ€™s precommit hook when qring is on your PATH).

  • After changing one of the editor plugins:

    • Cursor: pnpm run plugin:sync copies cursor-plugin/ to ~/.cursor/plugins/local/my-plugin (or pass a custom path).

    • Kiro: pnpm run plugin:sync:kiro copies kiro-plugin/mcp.json โ†’ ~/.kiro/settings/mcp.json, plus steering/ and hooks/ (or pass a project .kiro path). Prefer adding kiro-plugin/ as a Power from the Powers panel instead.

    • Claude Code: pnpm run plugin:sync:claude copies claude-code-plugin/ into the current directory (or pass a project path; add --user to install at ~/.claude/).

  • See also docs/cli-mcp-parity.md.

๐Ÿ“œ License

AGPL-3.0 - Free to use, modify, and share. Any derivative work or hosted service must release its source code under the same license.

Install Server
A
license - permissive license
A
quality
B
maintenance

Maintenance

โ€“Maintainers
โ€“Response time
2dRelease cycle
20Releases (12mo)

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/I4cTime/quantum_ring'

If you have feedback or need assistance with the MCP directory API, please join our Discord server