network-ai
Advanced tools
+1
-1
| { | ||
| "name": "network-ai", | ||
| "version": "4.10.3", | ||
| "version": "4.10.4", | ||
| "description": "AI agent orchestration framework for TypeScript/Node.js - 17 adapters (LangChain, AutoGen, CrewAI, OpenAI Assistants, LlamaIndex, Semantic Kernel, Haystack, DSPy, Agno, MCP, OpenClaw, A2A, Codex, MiniMax, NemoClaw, APS + streaming variants). Built-in CLI, security, swarm intelligence, real-time streaming, and agentic workflow patterns.", | ||
@@ -5,0 +5,0 @@ "homepage": "https://network-ai.org", |
+1
-1
@@ -8,3 +8,3 @@ # Network-AI | ||
| [](https://github.com/Jovancoding/Network-AI/actions/workflows/codeql.yml) | ||
| [](https://github.com/Jovancoding/Network-AI/releases) | ||
| [](https://github.com/Jovancoding/Network-AI/releases) | ||
| [](https://www.npmjs.com/package/network-ai) | ||
@@ -11,0 +11,0 @@ [](#testing) |
+3
-25
| ๏ปฟ--- | ||
| name: Network-AI | ||
| description: "Local Python orchestration skill: multi-agent workflows via shared blackboard file, permission gating, token budget scripts, and persistent project context. All execution is local with zero network calls and zero third-party dependencies." | ||
| description: "Local Python orchestration skill: multi-agent workflows via shared blackboard file, permission gating, token budget scripts, and persistent project context. The bundled Python scripts make no network calls and have zero third-party dependencies. Workflow delegations via the host platform's sessions_send may invoke external model APIs." | ||
| metadata: | ||
@@ -9,3 +9,3 @@ openclaw: | ||
| bundle_scope: "Python scripts only (scripts/*.py). All execution is local." | ||
| network_calls: none | ||
| network_calls: "none from bundled scripts; platform sessions_send delegations may invoke external models" | ||
| sessions_ops: "platform-provided" | ||
@@ -29,3 +29,3 @@ requires: | ||
| > **Scope:** All instructions below run local Python scripts (`scripts/*.py`). No network calls are made. Tokens are UUID-based (`grant_{uuid4().hex}`) stored in `data/active_grants.json`. Audit logging is plain JSONL (`data/audit_log.jsonl`). | ||
| > **Scope:** The bundled Python scripts (`scripts/*.py`) make no network calls, use only the Python standard library, and have zero third-party dependencies. Tokens are UUID-based (`grant_{uuid4().hex}`) stored in `data/active_grants.json`. Audit logging is plain JSONL (`data/audit_log.jsonl`). Workflow delegations that use the host platform's `sessions_send` may invoke external model APIs outside this skill's control. | ||
@@ -724,23 +724,1 @@ ## Setup | ||
| - [CLI Reference](QUICKSTART.md) - Full `network-ai` CLI command reference (ยง 10. CLI) | ||
| --- | ||
| ## Appendix: Optional Node.js Companion (npm) | ||
| > **This section describes a SEPARATE project โ not part of this ClawHub skill bundle.** | ||
| > The Python scripts above work completely without any of this. | ||
| > Install only if you want MCP server integration with Claude/Cursor/VS Code. | ||
| ```bash | ||
| npm install -g network-ai | ||
| npx network-ai-server --port 3001 | ||
| ``` | ||
| The companion npm package (`network-ai`) provides: | ||
| - HMAC / Ed25519-signed audit tokens (vs UUID tokens in the Python layer) | ||
| - AES-256 blackboard encryption | ||
| - A standalone MCP server for IDE integration (Claude, Cursor, VS Code) | ||
| - 17 framework adapters (LangChain, AutoGen, CrewAI, DSPy, LlamaIndex, NemoClaw, APS, etc.) | ||
| - A full CLI (`network-ai bb`, `network-ai auth`, `network-ai budget`, `network-ai audit`) | ||
| None of the above are provided by this skill's Python scripts. No network calls are made by this skill. |
Network access
Supply chain riskThis module accesses the network.
Found 3 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 3 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 5 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1527177
-0.03%