Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
| NODE_ENV | No | Standard environment variable used as a fallback for environment detection if QRING_ENV is not specified. | |
| QRING_ENV | No | Sets the current environment context for secret resolution (e.g., dev, staging, prod). This determines which value is returned when a secret exists in multiple states (Superposition). |
Capabilities
Features and capabilities supported by this server
| Capability | Details |
|---|---|
| tools | {
"listChanged": true
} |
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| get_secret | Retrieve a secret by key. Collapses superposition if the secret has multiple environment states. Records access in audit log (observer effect). |
| list_secrets | List all secret keys with quantum metadata (scope, decay status, superposition states, entanglement, access count). Values are never exposed. |
| set_secret | Store a secret with optional quantum metadata: TTL (decay), environment state (superposition), description, tags. |
| delete_secret | Remove a secret from the keyring. |
| has_secret | Check if a secret exists. Returns boolean. Never reveals the value. Respects decay — expired secrets return false. |
| inspect_secret | Show full quantum state of a secret: superposition states, decay status, entanglement links, access history. Never reveals the actual value. |
| detect_environment | Detect the current environment context (wavefunction collapse). Returns the detected environment and its source (NODE_ENV, git branch, project config, etc.). |
| generate_secret | Generate a cryptographic secret (quantum noise). Formats: hex, base64, alphanumeric, uuid, api-key, token, password. Optionally save directly to the keyring. |
| entangle_secrets | Create a quantum entanglement between two secrets. When the source is rotated/updated, the target automatically receives the same value. |
| tunnel_create | Create an ephemeral secret that exists only in memory (quantum tunneling). Never persisted to disk. Optional TTL and max-reads for self-destruction. |
| tunnel_read | Read an ephemeral tunneled secret by ID. May self-destruct if max-reads is reached. |
| tunnel_list | List active tunneled secrets (IDs and metadata only, never values). |
| tunnel_destroy | Immediately destroy a tunneled secret. |
| teleport_pack | Pack secrets into an AES-256-GCM encrypted bundle for sharing between machines (quantum teleportation). |
| teleport_unpack | Decrypt and import secrets from a teleport bundle. |
| audit_log | Query the audit log for secret access history (observer effect). Shows who accessed what and when. |
| detect_anomalies | Scan for anomalous secret access patterns: burst reads, unusual-hour access. Returns findings and recommendations. |
| health_check | Run a comprehensive health check on all secrets: decay status, staleness, anomalies, entropy assessment. |
| agent_scan | Run an autonomous agent health scan: checks decay, staleness, anomalies, and optionally auto-rotates expired secrets. Returns a structured report. |
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
No prompts | |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
No resources | |