retyc-cli

mcp
Guvenlik Denetimi
Gecti
Health Gecti
  • License — License: MIT
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Community trust — 20 GitHub stars
Code Gecti
  • Code scan — Scanned 9 files during light audit, no dangerous patterns found
Permissions Gecti
  • Permissions — No dangerous permissions requested

Bu listing icin henuz AI raporu yok.

SUMMARY

Official CLI client for Retyc with MCP server

README.md

Retyc logo

CI GoReportCard Release License: MIT

Retyc CLI

Official command-line interface for Retyc - send transfers and manage datarooms directly from
your terminal. Also runs as a local MCP server: connect your AI agent and control Retyc in plain language.

Retyc CLI demo

What is Retyc?

Retyc is a European sovereign file-sharing platform with end-to-end post-quantum encryption. Data
stays in Europe, GDPR-compliant by design.

retyc-cli lets you integrate Retyc transfers and datarooms into your scripts, pipelines, and workflows - no browser
required.


Installation

Pre-compiled binaries (recommended)

Download the binary for your platform from the latest release.

With go install

go install -tags prod github.com/retyc/retyc-cli@latest

From source

git clone https://github.com/retyc/retyc-cli.git
cd retyc-cli
go build -tags prod -ldflags "-X github.com/retyc/retyc-cli/cmd.Version=$(git describe --tags --always)" -o retyc .

With Docker

# Docker Hub
docker pull retyc/retyc-cli:latest
# GitHub Container Registry
docker pull ghcr.io/retyc/retyc-cli:latest

Quick start

# 1. Authenticate (opens a browser tab, no password stored)
retyc auth login

# 2. Send a file
retyc transfer create report.pdf

# 3. List your transfers
retyc transfer ls

# 4. Download a transfer
retyc transfer download <transfer-id>

Security

  • Authentication: OIDC device flow (no password ever stored locally)
  • File data + metadata: end-to-end encrypted with AGE post-quantum hybrid keys
  • Private key caching (Linux only): the decrypted AGE identity is stored in the kernel session keyring and is never
    written to disk. It is scoped to the current terminal session, isolated from other users and sessions, and uses a
    sliding TTL (default: 60 seconds). Each access refreshes the expiration timer.
  • Transport: TLS enforced by default

MCP Server

retyc-cli runs as a Model Context Protocol server — connect it to your AI agent and control Retyc in plain language:

"Create a dataroom called 'Release v2', upload ./dist/, and add [email protected] as editor."
"Send all PDFs in ./reports/ to [email protected], expire in 7 days."
"List my latest transfers and download the most recent one into ~/Downloads/."

Quick setup with Claude Code:

# Use read -s to avoid storing the passphrase in shell history
read -rs RETYC_KEY_PASSPHRASE
claude mcp add --transport stdio retyc --env RETYC_KEY_PASSPHRASE="$RETYC_KEY_PASSPHRASE" -- /path/to/retyc mcp serve

Full integration guide (Claude Desktop, Cursor, Windsurf, example prompts): doc/mcp.md


Documentation

Topic Link
Full commands reference doc/commands.md
MCP server + tools reference doc/mcp.md
Docker usage doc/docker.md
CI / CD integration doc/ci-cd.md
Configuration & env vars doc/configuration.md
Roadmap doc/roadmap.md

Development

# Run in dev mode
go run . --help

# Run tests
go test -race ./...

# Production build
go build -tags prod -ldflags "-X github.com/retyc/retyc-cli/cmd.Version=v0.1.0" -o retyc .

License

MIT - © Retyc / TripleStack SAS

Yorumlar (0)

Sonuc bulunamadi