omniwire

mcp
Guvenlik Denetimi
Basarisiz
Health Uyari
  • License — License: GPL-3.0
  • Description — Repository has a description
  • Active repo — Last push 0 days ago
  • Low visibility — Only 7 GitHub stars
Code Basarisiz
  • exec() — Shell command execution in src/claude/integration.ts
Permissions Gecti
  • Permissions — No dangerous permissions requested
Purpose
This tool provides an infrastructure control layer for AI agent swarms. It acts as an MCP server that allows AI agents to execute complex DevOps, networking, and server management tasks across multiple nodes via 88 distinct tools.

Security Assessment
Risk Level: High. The primary concern is a confirmed failure in the code audit: the tool explicitly executes shell commands (found in `src/claude/integration.ts`). This tool is designed to control VPNs, firewalls, browsers, and cookies, meaning it inherently handles highly sensitive system access and network configurations. While no hardcoded secrets or overly broad permissions were detected, giving an AI agent the ability to run arbitrary shell commands carries significant inherent risks. It must be sandboxed and restricted strictly to trusted environments.

Quality Assessment
From a maintenance perspective, the project is highly active, with its last code push occurring today. It also uses a standard open-source license (GPL-3.0). However, community trust and visibility are currently very low. With only 7 stars on GitHub, the project has not undergone widespread peer review or testing. It is essentially an experimental, early-stage tool.

Verdict
Use with extreme caution. Only deploy this in secure, isolated sandbox environments due to its high-risk shell execution capabilities and lack of broad community auditing.
SUMMARY

Infrastructure layer for AI agent swarms — 88 MCP tools · A2A · OmniMesh VPN · Scrapling scraper · COC sync · nftables firewall · CDP browser · 2FA TOTP · ~80ms

README.md

OmniWire — The infrastructure layer for AI agent swarms

npm tools A2A latency cyberbase license ClawHub OpenClaw

The infrastructure layer for AI agent swarms.

88 MCP tools · A2A protocol · OmniMesh VPN · nftables firewall · CDP browser · cookie sync · 2FA TOTP · bi-directional sync · CyberBase persistence


Quick Start

npm install -g omniwire

Add to your AI agent (Claude Code, Cursor, OpenCode, etc.):

{
  "mcpServers": {
    "omniwire": { "command": "omniwire", "args": ["--stdio"] }
  }
}

Why OmniWire?

Problem OmniWire Solution
Managing multiple servers manually One tool call controls any node
Agents can't coordinate with each other A2A messaging, events, semaphores
Multi-step deploys need many round-trips Pipelines chain steps in 1 call
Flaky commands break agent loops Built-in retry + assert + watch
Long tasks block the agent background: true on any tool
Results lost between tool calls Session store with {{key}} interpolation
Different transfer methods for diff sizes Auto-selects SFTP / netcat+LZ4 / aria2c
SSH connections drop Multi-path failover + circuit breaker

Use Cases

DevOps & Infrastructure

# Deploy to all nodes in one call
omniwire_deploy(src="node-a:/app/v2.tar.gz", dst="/opt/app/")

# Rolling service restart
omniwire_batch([
  {node: "node1", command: "systemctl restart app"},
  {node: "node2", command: "systemctl restart app"}
], parallel=false)

# Monitor disk across fleet
omniwire_disk_usage()

Security & Pentesting

# Anonymous nmap through Mullvad VPN
omniwire_exec(
  node="node-a",
  command="nmap -sV -T4 target.com",
  via_vpn="mullvad:se",
  background=true
)

# Rotate exit IP between scans
omniwire_vpn(action="rotate", node="node-a")

# Run nuclei through VPN namespace
omniwire_exec(command="nuclei -u target.com",
  via_vpn="mullvad", store_as="nuclei_results")

Multi-Agent Coordination

# Agent A dispatches work
omniwire_task_queue(action="enqueue",
  queue="recon", task="subfinder -d target.com")

# Agent B picks it up
omniwire_task_queue(action="dequeue", queue="recon")

# Share findings on blackboard
omniwire_blackboard(action="post",
  topic="subdomains", data="api.target.com")

# A2A messaging between agents
omniwire_a2a_message(action="send",
  channel="results", message="scan complete")

Background & Async Workflows

# Long build in background
omniwire_exec(
  command="docker build -t app .",
  node="node-a", background=true
)
# Returns: "BACKGROUND bg-abc123"

# Check progress
omniwire_bg(action="poll", task_id="bg-abc123")
# Returns: "RUNNING (45.2s)"

# Get result when done
omniwire_bg(action="result", task_id="bg-abc123")

# Pipeline: build → test → deploy
omniwire_pipeline(steps=[
  {node: "node-a", command: "make build"},
  {node: "node-a", command: "make test"},
  {command: "deploy.sh", store_as: "version"}
])

File Operations

# Transfer large dataset between nodes
omniwire_transfer_file(
  src="node-a:/data/model.bin",
  dst="hostinger:/ml/model.bin"
)
# Auto-selects: aria2c (16-conn parallel)

# Sync config to all nodes
omniwire_deploy(
  src_node="node-a",
  src_path="/etc/nginx/nginx.conf",
  dst_path="/etc/nginx/nginx.conf"
)

VPN & Anonymous Operations

# Full Mullvad setup for a node
omniwire_vpn(action="connect", server="se",
  node="node-a")
omniwire_vpn(action="quantum", config="on")
omniwire_vpn(action="daita", config="on")
omniwire_vpn(action="multihop", config="se:us")
omniwire_vpn(action="dns", config="adblock")
omniwire_vpn(action="killswitch", config="on")

# Verify anonymous IP
omniwire_vpn(action="ip", node="node-a")

# Node-wide VPN (mesh stays connected)
omniwire_vpn(action="full-on", server="de")

Architecture

graph TB
    subgraph clients["AI Agents"]
        CC["Claude Code"]
        OC["OpenCode / OpenClaw"]
        CU["Cursor / Any MCP Client"]
        A2["Other Agents (A2A)"]
    end

    subgraph omniwire["OmniWire MCP Server"]
        direction TB
        MCP["MCP Protocol Layer<br/>stdio | SSE | REST"]

        subgraph tools["88 Tools"]
            direction LR
            EXEC["Execution<br/>exec  run  batch<br/>broadcast  pipeline  bg"]
            AGENT["Agentic<br/>store  watch  task<br/>a2a  events  locks"]
            FILES["Files & Deploy<br/>read  write  transfer<br/>deploy  find"]
            SYS["System & DevOps<br/>docker  services<br/>cron  env  git  syslog"]
            SYNC["CyberSync<br/>sync  diff  search<br/>secrets  knowledge"]
        end

        subgraph engine["Core Engine"]
            direction LR
            POOL["SSH2 Pool<br/>persistent  compressed<br/>circuit breaker"]
            XFER["Transfer Engine<br/>SFTP  netcat+LZ4<br/>aria2c 16-conn"]
            CSYNC["Sync Engine<br/>PostgreSQL  XChaCha20<br/>parallel reconcile"]
        end
    end

    subgraph mesh["Infrastructure Mesh"]
        direction LR
        N1["Node A<br/>storage"]
        N2["Node B<br/>compute"]
        N3["Node C<br/>GPU"]
        N4["Node D<br/>local"]
    end

    DB[("PostgreSQL<br/>CyberBase")]

    CC & OC & CU & A2 -->|MCP| MCP
    MCP --> tools
    tools --> engine
    POOL -->|"SSH2 multi-path"| N1 & N2 & N3
    POOL -->|"local exec"| N4
    CSYNC --> DB

    style omniwire fill:#0D1117,stroke:#59C2FF,stroke-width:2px,color:#C6D0E1
    style clients fill:#161B22,stroke:#91B362,stroke-width:1px,color:#C6D0E1
    style mesh fill:#161B22,stroke:#E6B450,stroke-width:1px,color:#C6D0E1
    style tools fill:#0D1117,stroke:#59C2FF,stroke-width:1px,color:#C6D0E1
    style engine fill:#0D1117,stroke:#CC93E6,stroke-width:1px,color:#C6D0E1
    style MCP fill:#162B44,stroke:#59C2FF,color:#59C2FF
    style DB fill:#162B44,stroke:#CC93E6,color:#CC93E6

Agent Setup Instructions

OpenClaw

OmniWire is available as a ClawHub skill:

# Install via ClawHub CLI
clawhub install omniwire

# Or manual: copy integrations/openclaw/SKILL.md to your OpenClaw skills directory
cp integrations/openclaw/SKILL.md ~/.openclaw/skills/omniwire.md

CyberSync automatically ingests OpenClaw agents, skills, memory, and workspace into CyberBase PostgreSQL.

PaperClip

Register OmniWire as a zero-cost infrastructure agent:

{
  "agents": [{
    "name": "omniwire",
    "type": "local-cli",
    "command": "omniwire --stdio",
    "skills": ["mesh-exec", "file-transfer", "service-control", "docker", "vpn", "scraping", "firewall"],
    "budget": { "monthly_usd": 0 }
  }]
}

See integrations/paperclip/ for the full adapter and skill definition.

Claude Code

{
  "mcpServers": {
    "omniwire": {
      "command": "omniwire",
      "args": ["--stdio"]
    }
  }
}

OpenCode / Oh-My-OpenAgent

{
  "mcp": {
    "omniwire": {
      "type": "local",
      "command": ["omniwire", "--stdio"]
    }
  }
}

Codex / Gemini

CyberSync automatically syncs OmniWire config to Codex and Gemini environments.


Key Capabilities

Execution

omniwire_exec       single command + retry + assert
omniwire_run        multi-line script (compact UI)
omniwire_batch      N commands, 1 tool call, chaining
omniwire_broadcast  parallel across all nodes
omniwire_pipeline   multi-step DAG with data flow
omniwire_bg         poll/list background tasks

Multi-Agent (A2A)

omniwire_store        session key-value store
omniwire_a2a_message  agent-to-agent queues
omniwire_event        pub/sub event bus
omniwire_semaphore    distributed locking
omniwire_agent_task   async background dispatch
omniwire_workflow     reusable named DAGs

Adaptive File Transfer

 < 10 MB   SFTP         native, 80ms
 10M-1GB   netcat+LZ4   compressed, 100ms
 > 1 GB    aria2c       16-parallel, max speed

Connection Resilience

Connected --> Health Ping (30s, parallel)
    |
Failure --> Multi-path Failover
    |         WireGuard -> Tailscale -> Public IP
    |
    +--> Retry (300ms -> 600ms -> ... -> 10s)
    |
3 fails --> Circuit OPEN (15s) -> Auto-recover

Background Dispatch

# Any tool supports background: true
exec(background=true)   -> "bg-abc123"
bg(action="poll", id=..) -> "RUNNING (3.2s)"
bg(action="result", id=..) -> full output
bg(action="list")       -> all tasks + status

Agentic Chaining

exec(store_as="ip")       store result
exec(command="ping {{ip}}") interpolate
batch(abort_on_fail=true)   fail-fast
exec(format="json")         structured output
exec(retry=3, assert="ok")  resilient
watch(assert="ready")       poll until

All 88 Tools

Every tool supports background: true — returns a task ID immediately. Poll with omniwire_bg.

Execution (6)
Tool Description
omniwire_exec Run command on any node. retry, assert, store_as, format:"json", {{key}}, via_vpn.
omniwire_run Multi-line scripts via temp file.
omniwire_batch N commands in 1 call. Chaining {{prev}}, abort_on_fail, parallel/sequential.
omniwire_broadcast Execute on all nodes simultaneously.
omniwire_pipeline Multi-step DAG with {{prev}}/{{stepN}} interpolation.
omniwire_bg List/poll/retrieve background task results.
Agentic / A2A (12)
Tool Description
omniwire_store Session key-value store for cross-call chaining.
omniwire_watch Poll until assert matches — deploys, builds, readiness.
omniwire_healthcheck Parallel health probe all nodes (disk, mem, load, docker).
omniwire_agent_task Background task dispatch with poll/retrieve.
omniwire_a2a_message Agent-to-agent message queues (send/receive/peek).
omniwire_semaphore Distributed locking — atomic acquire/release.
omniwire_event Pub/sub events per topic.
omniwire_workflow Reusable named workflow DAGs.
omniwire_agent_registry Agent capability discovery + heartbeat.
omniwire_blackboard Shared blackboard for swarm coordination.
omniwire_task_queue Distributed priority queue — enqueue/dequeue/complete.
omniwire_capability Query node capabilities for intelligent routing.
Files & Transfer (6)
Tool Description
omniwire_read_file Read file from any node (node:/path).
omniwire_write_file Write/create file on any node.
omniwire_list_files List directory contents.
omniwire_find_files Glob search across nodes.
omniwire_transfer_file Copy between nodes (auto SFTP/netcat/aria2c).
omniwire_deploy Deploy one file to all nodes in parallel.
Monitoring (3)
Tool Description
omniwire_mesh_status Health, latency, CPU/mem/disk — all nodes.
omniwire_node_info Detailed info for one node.
omniwire_live_monitor Snapshot metrics: cpu, memory, disk, network.
System & DevOps (12)
Tool Description
omniwire_process_list List/filter processes across nodes.
omniwire_disk_usage Disk usage for all nodes.
omniwire_tail_log Last N lines of a log file.
omniwire_install_package Install via apt/npm/pip.
omniwire_service_control systemd start/stop/restart/status.
omniwire_docker Docker commands on any node.
omniwire_kernel dmesg, sysctl, modprobe, lsmod, strace, perf.
omniwire_cron List/add/remove cron jobs.
omniwire_env Get/set persistent environment variables.
omniwire_network ping, traceroute, dns, ports, speed, connections.
omniwire_git Git commands on repos on any node.
omniwire_syslog Query journalctl with filters.
Network, VPN & Security (9)
Tool Description
omniwire_firewall nftables engine — presets, rate-limit, geo-block, port-knock, ban/unban. Mesh whitelisted.
omniwire_vpn Mullvad/OpenVPN/WireGuard/Tailscale — multi-hop, DAITA, quantum, killswitch. Mesh-safe.
omniwire_cookies Cookie management — JSON/Header/Netscape, browser extract, CyberBase + 1Password sync.
omniwire_cdp Chrome DevTools Protocol — headless Chrome, screenshot, PDF, DOM, cookies.
omniwire_proxy HTTP/SOCKS proxy management on any node.
omniwire_dns DNS resolve, set server, flush cache, block domains.
omniwire_port_forward SSH tunnels — create/list/close/mesh-expose.
omniwire_shell Persistent PTY session (preserves cwd/env).
omniwire_clipboard Shared clipboard buffer across mesh.
Infrastructure (9)
Tool Description
omniwire_backup Snapshot/restore paths. Diff, cleanup, retention.
omniwire_container Docker lifecycle — compose, build, push, logs, prune, stats.
omniwire_cert TLS certs — Let's Encrypt, check expiry, self-signed.
omniwire_user User & SSH key management, sudo config.
omniwire_schedule Distributed cron with failover.
omniwire_alert Threshold alerting — disk/mem/load/offline + webhook notify.
omniwire_log_aggregate Cross-node log search in parallel.
omniwire_benchmark CPU/memory/disk/network benchmarks.
omniwire_stream Capture streaming output (tail -f, watch).
OmniMesh & Events (6)
Tool Description
omniwire_omnimesh WireGuard mesh manager — init/up/down/add-peer/sync-peers/health/rotate-keys/topology. All OS.
omniwire_mesh_expose Expose localhost services to mesh — discover/expose/unexpose/expose-remote.
omniwire_mesh_gateway Auto-expose all localhost services mesh-wide.
omniwire_events Webhook + WebSocket + SSE event bus. Publish, manage webhooks, query log.
omniwire_knowledge CyberBase knowledge CRUD, text/semantic search, health, vacuum, bulk-set, export.
omniwire_update Self-update from npm + GitHub. Auto-update, mesh-wide push.
Agent Toolkit (7)
Tool Description
omniwire_snippet Reusable command templates with {{var}} substitution.
omniwire_alias In-session command shortcuts.
omniwire_trace Distributed tracing — span waterfalls across nodes.
omniwire_doctor Health diagnostics — SSH, disk, mem, docker, WireGuard, CyberBase.
omniwire_metrics Prometheus-compatible metrics scrape/export.
omniwire_audit Command audit log — view/search/stats.
omniwire_plugin Plugin system — list/load from ~/.omniwire/plugins/.
CyberSync (9)
Tool Description
cybersync_status Sync status, item counts, pending syncs.
cybersync_sync_now Trigger immediate reconciliation.
cybersync_diff Local vs database differences.
cybersync_history Sync event log.
cybersync_search_knowledge Full-text search unified knowledge base.
cybersync_get_memory Retrieve Claude memory from PostgreSQL.
cybersync_manifest Tracked files per tool.
cybersync_force_push Force push file to all nodes.
omniwire_secrets Secrets management (1Password, file, env).

Performance

Operation Latency Optimization
Command exec ~80ms AES-128-GCM cipher, persistent SSH2, zero-fork : ping
Mesh status ~100ms Parallel probes, 5s cache, single /proc read
File read (<1MB) ~60ms SFTP-first (skips cat fork)
Transfer (10MB) ~120ms LZ4 compression (10x faster than gzip)
Transfer (1GB) ~8s aria2c 16-connection parallel
Pipeline (5 steps) ~400ms {{prev}} interpolation, no extra tool calls
Health check (all) ~90ms Parallel Promise.allSettled
A2A message ~85ms File-append queue, atomic dequeue
Reconnect ~300ms 300ms initial, 2s keepalive, 15s circuit breaker
Optimization details
  • Cipher: AES-128-GCM (AES-NI hardware accelerated)
  • Key exchange: curve25519-sha256 (fastest modern KEX)
  • Keepalive: 2s interval, 2 retries = 4s dead detection
  • Port finder: shuf (pure bash) replaces python3 -c socket (-30ms)
  • Compression: LZ4-1 for transfers (10x faster than gzip)
  • Buffer: Array push + join (O(n) vs O(n^2) string concat)
  • Status: Single /proc read replaces multiple piped commands
  • Health ping: : builtin (no hash lookup, no fork)
  • Reads: SFTP tried first, cat fallback only on failure
  • Circuit breaker: 15s recovery, 10s reconnect cap

Security

  • All remote execution via ssh2.Client.exec() -- never child_process.exec()
  • Key-based auth only, no passwords stored, SSH key caching
  • Multi-path failover: WireGuard -> Tailscale -> Public IP
  • Secret-bearing tool output is redacted by default (omniwire_env lists keys, not values)
  • Prefer 1Password or another managed vault for production secrets; file/env backends are local-development fallbacks
  • 2MB output guard prevents memory exhaustion
  • 4KB auto-truncation prevents context window bloat
  • Circuit breaker isolates failing nodes
  • CORS restricted to localhost on REST API

Transport Modes

Mode Port Use Case
--stdio -- Claude Code, Cursor, MCP subprocess
--sse-port=N 3200 OpenCode, remote HTTP MCP clients
--rest-port=N 3201 Scripts, dashboards, non-MCP
omniwire --stdio                          # MCP mode (default)
omniwire --sse-port=3200 --rest-port=3201 # HTTP mode
omniwire --stdio --no-sync               # MCP without CyberSync
omniwire    # or: ow                      # Interactive REPL

Configure Mesh

Create ~/.omniwire/mesh.json:

{
  "nodes": [
    { "id": "server1", "host": "10.0.0.1", "user": "root", "identityFile": "id_ed25519", "role": "storage" },
    { "id": "server2", "host": "10.0.0.2", "user": "root", "identityFile": "id_ed25519", "role": "compute" }
  ]
}

Agentic Installation / Setup

For adding a new node to your OmniWire mesh — what to have ready, how to wire it in, and how to connect it to Claude Code.

Prerequisites

Requirement Notes
Node.js >= 20 node -v to verify
npm >= 9 Comes with Node.js 20+
WireGuard wg CLI + kernel module (Linux: apt install wireguard, macOS: Homebrew, Windows: GUI installer)
SSH key pair Ed25519 recommended — ssh-keygen -t ed25519 -f ~/.ssh/id_omniwire
SSH access to nodes Key deployed to ~/.ssh/authorized_keys on every remote node
1Password CLI op v2+, signed in — required for omniwire_secrets and cookie sync to vault
PostgreSQL (optional) Required only for CyberSync / CyberBase persistence — Node A hosts it (configure CYBERSYNC_DB_URL accordingly)

Install OmniWire

npm install -g omniwire
omniwire --version   # verify

Add a New Node

1. Generate WireGuard keypair on the new node:

wg genkey | tee /etc/wireguard/node_private.key | wg pubkey > /etc/wireguard/node_pub.key
cat /etc/wireguard/node_pub.key

2. Assign it a mesh IP (next available in 10.0.0.0/24):

Node Mesh IP Role
Node A (hub) 10.0.0.1 storage, CyberBase
Hostinger 10.0.0.2 compute
Windows PC 10.0.0.3 local dev
ThinkPad 10.0.0.4 local dev
new node 10.0.0.N assign next

3. Register the node with OmniMesh (run from any node already in the mesh):

omniwire_omnimesh(action="add-peer",
  id="newnode",
  public_key="<pubkey from step 1>",
  allowed_ips="10.0.0.N/32",
  endpoint="<public IP or DNS>:51820"
)

4. Push updated peer list to all nodes:

omniwire_omnimesh(action="sync-peers")

5. Bring the interface up on the new node:

wg-quick up wg0
ping 10.0.0.1   # verify hub reachability

Configure OmniWire on the New Node

Add the node to ~/.omniwire/mesh.json (create if absent):

{
  "nodes": [
    { "id": "node-a",   "host": "10.0.0.1", "user": "root", "identityFile": "~/.ssh/id_omniwire", "role": "storage" },
    { "id": "hostinger", "host": "10.0.0.2", "user": "root", "identityFile": "~/.ssh/id_omniwire", "role": "compute" },
    { "id": "windows",   "host": "10.0.0.3", "user": "Admin", "identityFile": "~/.ssh/id_omniwire", "role": "local" },
    { "id": "thinkpad",  "host": "10.0.0.4", "user": "user",  "identityFile": "~/.ssh/id_omniwire", "role": "local" }
  ]
}

Verify connectivity:

omniwire_mesh_status    # should show all nodes green
omniwire_doctor         # checks SSH, disk, mem, WireGuard, CyberBase

Connect Claude Code via MCP

Add to ~/.claude/claude_desktop_config.json (or your IDE's MCP config):

{
  "mcpServers": {
    "omniwire": { "command": "omniwire", "args": ["--stdio"] }
  }
}

Restart Claude Code. Verify in a new session:

omniwire_mesh_status()   # 88 tools should be available

Environment Variables

Variable Required Description
OP_SERVICE_ACCOUNT_TOKEN For 1Password sync Service account token from 1Password
OMNIWIRE_VAULT_ROOT Optional Path to Obsidian vault root (default: CyberBase vault)
CYBERSYNC_DB_URL Optional PostgreSQL DSN — defaults to postgresql://[email protected]:5432/cyberbase
OMNIWIRE_MESH_CONFIG Optional Override mesh.json path

Set persistently on a node. Values are written to /etc/environment, but tool responses only confirm whether a value is set and never echo the secret back:

omniwire_env(action="set", key="OP_SERVICE_ACCOUNT_TOKEN", value="<token>", node="node-a")
omniwire_env(action="get", key="OP_SERVICE_ACCOUNT_TOKEN", node="node-a")  # OP_SERVICE_ACCOUNT_TOKEN=<redacted: set>

CyberSync Auto-Distribution

CyberSync pushes configs, secrets, and memories to all nodes automatically via PostgreSQL.

# Check what's tracked
omniwire_coc(action="cybersync-status")

# Force push current config to all nodes
omniwire_coc(action="force-sync")

# Diff local state vs database
cybersync_diff()

On first run, CyberSync pulls node configs, 2FA seeds, and Claude memories from CyberBase — no manual copy-paste between machines.


Changelog

v3.0.0 -- 81 Tools, CyberBase Persistence, Full Platform

19 new tools: proxy, dns, backup, container, cert, user, schedule, alert, log_aggregate, benchmark, snippet, alias, trace, doctor, metrics, audit, plugin, cookies, cdp.

CyberBase auto-persistence: Store, audit, blackboard, cookies all sync to PostgreSQL. pgvector semantic search. 5s statement_timeout on all DB calls.

Architecture: Priority command queues, smart output truncation, predictive node selection, latency history, connection pool stats.

Security: Command denylist (blocks rm -rf /, fork bombs, disk wipes). Audit log with CyberBase persistence.

A2A: Typed message schemas (JSON validation), dead letter queue for failed tasks, pub/sub event filters.

DX: GitHub Actions CI, bash/zsh/fish shell completions, --json flag, cookie sync to 1Password.

v2.7.0 -- Firewall Engine

omniwire_firewall: nftables-based firewall engine with 17 actions. Presets (server, paranoid, minimal, pentest), rate-limiting, geo-blocking by country, port-knocking sequences, IP ban/unban, whitelist/blacklist, rule management, audit log, save/restore.

Zero mesh impact: wg0, wg1, tailscale0, and all mesh CIDRs (10.0.0.0/24, 10.20.0.0/24, 100.64.0.0/10) are always whitelisted before any hardening rules. nftables runs in kernel space — zero latency overhead.

v2.6.0 -- VPN Integration, Mesh-Safe Anonymous Scanning

omniwire_vpn tool: Mullvad, OpenVPN, WireGuard, Tailscale. Split-tunnel (per-command) + full-node modes. Mesh connectivity (wg0, wg1, Tailscale) always preserved via route exclusions and network namespace isolation.

via_vpn on exec: Route any command through VPN using Linux network namespaces. Only the command's traffic goes through VPN — SSH/WireGuard mesh stays on real interface.

Modes: connect (split-tunnel), full-on (node-wide with mesh exclusions), rotate (new exit IP), status, list, ip.

v2.5.1 -- Universal Background Dispatch

background: true auto-injected into all 88 tools via server-level wrapper. Returns task ID, poll with omniwire_bg. New omniwire_bg tool for list/poll/result.

v2.5.0 -- Performance Overhaul, A2A Protocol Expansion

Performance: AES-128-GCM cipher, curve25519-sha256 KEX, 2s keepalive, LZ4 transfers (10x faster), shuf port finder (-30ms), SFTP-first reads, array buffer concat, /proc single-read status, : builtin health ping, 300ms reconnect start, 15s circuit breaker.

4 new A2A tools (49 -> 53): agent_registry (capability discovery), blackboard (swarm collaboration), task_queue (distributed work), capability (node routing).

v2.4.0 -- Agentic Loop, A2A, Multi-Agent Orchestration

9 new agentic tools (40 -> 49): store, pipeline, watch, healthcheck, agent_task, a2a_message, semaphore, event, workflow. Agentic upgrades: format:"json", retry, assert, store_as, {{key}} interpolation.

v2.3.0 -- Compact Output, Speed, New Tools

Output overhaul (auto-truncation, smart time, tabular multi-node). 6 new DevOps tools (cron, env, network, clipboard, git, syslog).

v2.2.1 -- v2.1.0

Security fixes, multi-path SSH failover, CyberBase integration, VaultBridge Obsidian mirror.


omniwire/
  src/
    mcp/           MCP server (88 tools, 3 transports)
    nodes/         SSH2 pool, transfer engine, PTY, tunnels
    sync/          CyberSync + CyberBase (PostgreSQL, Obsidian, encryption)
    protocol/      Mesh config, types, path parsing
    commands/      Interactive REPL
    ui/            Terminal formatting

Requirements: Node.js >= 20 • SSH key access to nodes • PostgreSQL (CyberSync only) • WireGuard recommended


Changelog

Version Date Changes
v3.5.0 2026-03-30 Full OpenClaw + PaperClip integration. ClawHub skill updated (v2.1.0→v3.5.0, 30→88 tools). Agent setup instructions for OpenClaw, PaperClip, Oh-My-OpenAgent. Updated all integration manifests. New: integrations/paperclip/SKILL.md, integrations/paperclip/README.md.
v3.4.1 2026-03-30 Cross-OS: omniwire_scrape install works on Linux (systemd), macOS (launchd), Windows, Docker (nohup). Auto-upgrades deps + browsers. Python/pip path detection.
v3.4.0 2026-03-30 Rewrite: omniwire_scrape — OmniMesh-routed Scrapling with auto-install, VPN routing, adaptive selectors, XPath, bulk sessions. install/status actions. Full README audit (88 tools).
v3.3.1 2026-03-30 New: omniwire_scrape tool — Scrapling-powered web scraping (static/browser/stealth modes, Cloudflare bypass, TLS spoofing).
v3.3.0 2026-03-30 New: omniwire_coc tool — unified CyberBase + Obsidian + Canvas sync. Auto-creates vault + canvas. mirror-db exports entire DB as .md. Configurable vault via OMNIWIRE_VAULT_ROOT env.
v3.2.2 2026-03-30 Fix: sync GitHub/npm metadata — badge, description, mermaid diagram all reflect 86 tools
v3.2.1 2026-03-30 New: 5 bi-directional sync tools (omniwire_sync, omniwire_sync_rules, omniwire_sync_hooks, omniwire_sync_memory, omniwire_sync_agents) — 86 tools total
v3.2.0 2026-03-29 New: omniwire_2fa TOTP manager — add/generate/verify/import/export 2FA codes, CyberBase + 1Password persistence, otpauth:// URI import, bulk code generation
v3.1.5 2026-03-29 Fix: skip auto-audit batch entries from Obsidian vault + Canvas sync to prevent junk files
v3.1.4 2026-03-29 Auto-sync CyberBase writes to Obsidian vault + Canvas mindmap, collision-avoidance grid placement, sync-obsidian / sync-canvas actions in knowledge tool
v3.1.3 2026-03-29 OmniMesh WireGuard mesh manager, event bus (Webhook/WS/SSE), knowledge tool (12 actions), auto-update system, CDP rewrite (persistent Docker container, 18 actions), mesh expose/gateway, CyberBase circuit breaker + SQL hardening
v3.1.2 2026-03-28 Collapsible tool sections in README, npm README sync
v3.1.1 2026-03-28 Bug fixes, improved error handling in CDP tool
v3.1.0 2026-03-27 OmniMesh VPN, 81 MCP tools, A2A protocol, event system, background dispatch
v3.0.0 2026-03-25 Major rewrite: CyberSync, pipeline DAGs, blackboard, task queues, LZ4 transfers, AES-128-GCM encryption
v2.6.1 2026-03-20 VPN routing (Mullvad/OpenVPN/WG/Tailscale), multi-hop, DAITA, quantum tunnels
v2.5.0 2026-03-15 Firewall management (nftables), cert management, deploy tool
v2.0.0 2026-03-10 CDP browser automation, cookie sync, 1Password integration
v1.0.0 2026-03-01 Initial release — SSH exec, file transfer, node management


downloads stars issues

Built for the machines that build for us.

Yorumlar (0)

Sonuc bulunamadi