carmenta
by carmentacollective
Overview
A heart-centered AI platform that unifies external services and internal AI agents into a single conversational interface, facilitating intelligent routing, personal knowledge management, and automated task execution.
Installation
pnpm run startEnvironment Variables
- NODE_ENV
- OPENROUTER_API_KEY
- AI_GATEWAY_API_KEY
- AI_LIVE_TESTS
- SENTRY_DSN
- SENTRY_AUTH_TOKEN
- CLERK_SECRET_KEY
- CLERK_WEBHOOK_SECRET
- QUO_WEBHOOK_SECRET
- QUO_NOTIFICATION_API_KEY
- QUO_PHONE_NUMBER
- PARALLEL_API_KEY
- ENCRYPTION_KEY
- NOTION_CLIENT_ID
- NOTION_CLIENT_SECRET
- SLACK_CLIENT_ID
- SLACK_CLIENT_SECRET
- CLICKUP_CLIENT_ID
- CLICKUP_CLIENT_SECRET
- DROPBOX_CLIENT_ID
- DROPBOX_CLIENT_SECRET
- GOOGLE_SENSITIVE_CLIENT_ID
- GOOGLE_SENSITIVE_CLIENT_SECRET
- GOOGLE_RESTRICTED_CLIENT_ID
- GOOGLE_RESTRICTED_CLIENT_SECRET
- SPOTIFY_CLIENT_ID
- SPOTIFY_CLIENT_SECRET
- TWITTER_CLIENT_ID
- TWITTER_CLIENT_SECRET
- LINKEDIN_CLIENT_ID
- LINKEDIN_CLIENT_SECRET
- ASANA_CLIENT_ID
- ASANA_CLIENT_SECRET
- BRAINTRUST_API_KEY
- DEEPGRAM_API_KEY
- DATABASE_URL
- GIPHY_API_KEY
- IMGFLIP_USERNAME
- IMGFLIP_PASSWORD
- VAPID_PRIVATE_KEY
- VAPID_SUBJECT_EMAIL
- GITHUB_APP_ID
- GITHUB_APP_PRIVATE_KEY
- GITHUB_APP_INSTALLATION_ID
- NEXT_PUBLIC_APP_URL
- NEXT_PUBLIC_SENTRY_DSN
- NEXT_PUBLIC_CLERK_PUBLISHABLE_KEY
- NEXT_PUBLIC_SUPABASE_URL
- NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY
- NEXT_PUBLIC_POSTHOG_KEY
- NEXT_PUBLIC_POSTHOG_HOST
- NEXT_PUBLIC_GOOGLE_API_KEY
- NEXT_PUBLIC_VAPID_PUBLIC_KEY
- TEMPORAL_ADDRESS
- CRON_SECRET
Security Notes
The system employs robust AES-256-GCM encryption for API keys and OAuth tokens stored in the database, and uses SVIX for webhook signature verification. However, it exposes high-privilege features: 1. **Code Mode**: Allows execution of arbitrary bash commands (`lib/code/bash-executor.ts`) within user-selected project paths. While `DANGEROUS_DIRS` are defined and environment variables are sanitized, this feature inherently carries a high risk if not rigorously sandboxed and permissioned for specific, trusted users/environments. 2. **MCP Servers**: AI agents can configure and interact with custom Microservice Control Plane (MCP) servers, allowing dynamic integration of external APIs via `createMcpServer` and `raw_api` calls. This significantly expands the attack surface, as a malicious or compromised MCP server could execute arbitrary operations. 3. **Raw API Access**: Many service adapters (e.g., LinkedIn, CoinMarketCap, Gmail, Spotify) expose a `raw_api` operation, enabling AI agents to make direct, arbitrary calls to external service APIs. This bypasses higher-level abstractions and requires careful control of the agent's intent and context. Rigorous access control, environment isolation (e.g., running Code Mode in ephemeral, isolated containers), and comprehensive monitoring are critical.
Similar Servers
agents
This MCP (Model Context Protocol) Server acts as a proxy for the Inkeep Agent Framework's Management API. It exposes administrative functionalities (e.g., CRUD operations for agents, projects, tools, and credentials) via the MCP protocol, allowing other clients or agents to interact with the Inkeep Management API through a standardized interface.
admin
The server acts as a control plane for Model Context Protocol (MCP) traffic, providing a unified API gateway for authentication, routing, and observability across various AI-native services and clients.
context-engine
Provides an agent-agnostic local context engine via Model Context Protocol (MCP) for coding agents, enabling semantic search, planning, code review, and prompt enhancement with AI integration.
tiny-robot
A Vue 3 component library and AI interaction kit for building AI-powered frontend applications, providing UI components and a unified API interface to interact with various large AI models.