Back to Home
juspay icon

neurolink

Verified Safe

by juspay

Overview

Provides a universal AI development platform with multi-provider support, middleware, tool orchestration, and AI-powered workflow automation.

Installation

Run Command
npx @juspay/neurolink

Environment Variables

  • OPENAI_API_KEY
  • ANTHROPIC_API_KEY
  • GOOGLE_AI_API_KEY
  • AZURE_OPENAI_API_KEY
  • AZURE_OPENAI_ENDPOINT
  • AZURE_OPENAI_DEPLOYMENT
  • AWS_ACCESS_KEY_ID
  • AWS_SECRET_ACCESS_KEY
  • AWS_REGION
  • BEDROCK_MODEL
  • BEDROCK_ENDPOINT_URL
  • VERTEX_MODEL
  • GOOGLE_APPLICATION_CREDENTIALS
  • GOOGLE_AUTH_TYPE
  • GOOGLE_AUTH_CLIENT_EMAIL
  • GOOGLE_AUTH_PRIVATE_KEY
  • GOOGLE_VERTEX_PROJECT
  • GOOGLE_VERTEX_LOCATION
  • HUGGINGFACE_API_KEY
  • HF_TOKEN
  • HUGGINGFACE_MODEL
  • MISTRAL_API_KEY
  • MISTRAL_MODEL
  • OLLAMA_API_BASE
  • OLLAMA_MODEL
  • LITELLM_API_KEY
  • LITELLM_BASE_URL
  • LITELLM_MODEL
  • OPENAI_COMPATIBLE_API_KEY
  • OPENAI_COMPATIBLE_BASE_URL
  • OPENAI_COMPATIBLE_MODEL
  • SAGEMAKER_MODEL_NAME
  • SAGEMAKER_ENDPOINT_NAME
  • HTTP_PROXY
  • HTTPS_PROXY
  • ALL_PROXY
  • NO_PROXY
  • NEUROLINK_LOG_LEVEL
  • NEUROLINK_TELEMETRY_ENABLED
  • OTEL_EXPORTER_OTLP_ENDPOINT
  • OTEL_SERVICE_NAME
  • OTEL_SERVICE_VERSION
  • NEUROLINK_EVALUATION_THRESHOLD
  • NEUROLINK_CONTEXT_EXCLUDE_FIELDS
  • NEUROLINK_CONTEXT_INCLUDE_FIELDS
  • NEUROLINK_CONTEXT_OVERRIDE_FIELDS
  • NEUROLINK_TOOL_CACHE_DURATION
  • NEUROLINK_TOOL_DESCRIPTION_MAX_LENGTH
  • NEUROLINK_TOOL_NAME_MAX_LENGTH
  • NEUROLINK_MAX_TOOLS_PER_PROVIDER
  • STORAGE_TYPE
  • REDIS_HOST
  • REDIS_PORT
  • REDIS_PASSWORD
  • REDIS_DB
  • MEM0_API_KEY
  • MEM0_URL

Security Notes

The system features robust, multi-layered security measures including Human-in-the-Loop (HITL) for critical actions and AI-driven input/output content filtering and sanitization. Sensitive configurations like API keys and proxy settings are handled via environment variables and masked in logs. The primary remaining risk vector is the use of `child_process.spawn` for external MCP servers, which is a fundamental design choice to allow running external tools. This carries inherent risks if the configuration sources for these external servers (e.g., `.mcp-config.json`) are compromised or controlled by untrusted entities. Assuming secure management of these configuration files and leveraging the built-in HITL and validation, the system is designed to be secure.

Similar Servers

Stats

Interest Score56
Security Score8
Cost ClassHigh
Avg Tokens5000
Stars103
Forks78
Last Update2025-12-06

Tags

AI PlatformMiddlewareToolingOrchestrationCLIAgentic WorkflowProxy SupportObservabilityHuman-in-the-LoopMultimodal