Credentials & Security
Memoryblock monitors can manage their own credentials via these security-focused tools. All operations are strictly sandboxed.
Auth Management
auth_read
Retrieves the names of currently configured auth providers (e.g. “aws”, “openai”, “telegram”).
- Parameters: N/A
- Approval: No
- Note: Security feature — this only returns names of the companies/services, never the secret keys.
auth_write
Centrally updates credentials for an API provider on disk in auth.json.
- Parameters:
service(string),credentials(JSON-stringified object) - Approval: Yes (Human required)
- Required Scope: system (Superblock)
- Note: This allows a monitor to help you rotate keys or add a new provider like Gemini.
list_auth_providers
Lists the expected JSON schemas for common auth providers.
- Parameters: N/A
- Approval: No
- Note: Shows the fields a monitor needs to successfully write an
auth_writepayload.
Security Controls
- Never Readable: Even with full
systemscope, tools likeread_fileare explicitly blocked (in the Registry-level Gatekeeper) from readingauth.jsonor.envfiles. - Human Approval:
auth_writealways requires an explicit human confirm to prevent a rogue monitor from attempting to overwrite your keys with their own. - Centralized: All credentials are saved in the block’s
auth.json(for portability) or the global fallback in~/.memoryblock/ws/auth.json.