Back to Home
carmentacollective icon

carmenta

by carmentacollective

Overview

A heart-centered AI platform that unifies external services and internal AI agents into a single conversational interface, facilitating intelligent routing, personal knowledge management, and automated task execution.

Installation

Run Command
pnpm run start

Environment Variables

  • NODE_ENV
  • OPENROUTER_API_KEY
  • AI_GATEWAY_API_KEY
  • AI_LIVE_TESTS
  • SENTRY_DSN
  • SENTRY_AUTH_TOKEN
  • CLERK_SECRET_KEY
  • CLERK_WEBHOOK_SECRET
  • QUO_WEBHOOK_SECRET
  • QUO_NOTIFICATION_API_KEY
  • QUO_PHONE_NUMBER
  • PARALLEL_API_KEY
  • ENCRYPTION_KEY
  • NOTION_CLIENT_ID
  • NOTION_CLIENT_SECRET
  • SLACK_CLIENT_ID
  • SLACK_CLIENT_SECRET
  • CLICKUP_CLIENT_ID
  • CLICKUP_CLIENT_SECRET
  • DROPBOX_CLIENT_ID
  • DROPBOX_CLIENT_SECRET
  • GOOGLE_SENSITIVE_CLIENT_ID
  • GOOGLE_SENSITIVE_CLIENT_SECRET
  • GOOGLE_RESTRICTED_CLIENT_ID
  • GOOGLE_RESTRICTED_CLIENT_SECRET
  • SPOTIFY_CLIENT_ID
  • SPOTIFY_CLIENT_SECRET
  • TWITTER_CLIENT_ID
  • TWITTER_CLIENT_SECRET
  • LINKEDIN_CLIENT_ID
  • LINKEDIN_CLIENT_SECRET
  • ASANA_CLIENT_ID
  • ASANA_CLIENT_SECRET
  • BRAINTRUST_API_KEY
  • DEEPGRAM_API_KEY
  • DATABASE_URL
  • GIPHY_API_KEY
  • IMGFLIP_USERNAME
  • IMGFLIP_PASSWORD
  • VAPID_PRIVATE_KEY
  • VAPID_SUBJECT_EMAIL
  • GITHUB_APP_ID
  • GITHUB_APP_PRIVATE_KEY
  • GITHUB_APP_INSTALLATION_ID
  • NEXT_PUBLIC_APP_URL
  • NEXT_PUBLIC_SENTRY_DSN
  • NEXT_PUBLIC_CLERK_PUBLISHABLE_KEY
  • NEXT_PUBLIC_SUPABASE_URL
  • NEXT_PUBLIC_SUPABASE_PUBLISHABLE_KEY
  • NEXT_PUBLIC_POSTHOG_KEY
  • NEXT_PUBLIC_POSTHOG_HOST
  • NEXT_PUBLIC_GOOGLE_API_KEY
  • NEXT_PUBLIC_VAPID_PUBLIC_KEY
  • TEMPORAL_ADDRESS
  • CRON_SECRET

Security Notes

The system employs robust AES-256-GCM encryption for API keys and OAuth tokens stored in the database, and uses SVIX for webhook signature verification. However, it exposes high-privilege features: 1. **Code Mode**: Allows execution of arbitrary bash commands (`lib/code/bash-executor.ts`) within user-selected project paths. While `DANGEROUS_DIRS` are defined and environment variables are sanitized, this feature inherently carries a high risk if not rigorously sandboxed and permissioned for specific, trusted users/environments. 2. **MCP Servers**: AI agents can configure and interact with custom Microservice Control Plane (MCP) servers, allowing dynamic integration of external APIs via `createMcpServer` and `raw_api` calls. This significantly expands the attack surface, as a malicious or compromised MCP server could execute arbitrary operations. 3. **Raw API Access**: Many service adapters (e.g., LinkedIn, CoinMarketCap, Gmail, Spotify) expose a `raw_api` operation, enabling AI agents to make direct, arbitrary calls to external service APIs. This bypasses higher-level abstractions and requires careful control of the agent's intent and context. Rigorous access control, environment isolation (e.g., running Code Mode in ephemeral, isolated containers), and comprehensive monitoring are critical.

Similar Servers

Stats

Interest Score32
Security Score6
Cost ClassMedium-High
Avg Tokens1000
Stars2
Forks1
Last Update2026-01-19

Tags

AILLMIntegrationsConversational AITask Automation