Kontext CLI
Stop giving your AI agent long-lived API keys — ephemeral credentials that expire on session end
Kontext CLI is a Go binary that wraps AI coding agents — currently Claude Code — with enterprise-grade credential management. Instead of storing long-lived API keys in .env files your agent can read and potentially leak, you declare what credentials your project needs in a .env.kontext file using placeholders like {{kontext:github}}. When you run 'kontext start', it authenticates via OIDC, exchanges placeholders for short-lived scoped tokens via RFC 8693 token exchange, injects them into the agent's environment, and streams every tool call to an audit dashboard. When the session ends, credentials expire automatically. The .env.kontext file is safe to commit — no secrets, just declarations. Written in Go with zero runtime dependencies. Solves a real but underappreciated security gap: AI agents with access to long-lived credentials are high-value targets for prompt injection and confused deputy attacks.
Panel Reviews
The Builder
Developer Perspective
“The credential problem with AI agents is real and underappreciated. When your agent has a GitHub token, Stripe key, and database connection in its environment, a single prompt injection can exfiltrate all of them. Kontext's ephemeral model — short-lived, scoped, auto-expired — is exactly how this should work. MIT license, native Go binary, no Docker required.”
The Skeptic
Reality Check
“The OIDC approach introduces a dependency that has to be up and authenticated for your agent to start at all. The threat model — your agent leaking long-lived keys — is real but theoretical for most solo developers. Prompt injection attacks that exfiltrate .env files are possible but not common in practice yet. For indie builders, you're adding complexity to a problem you probably don't have.”
The Futurist
Big Picture
“As coding agents get more autonomous — running overnight, spawning sub-agents, executing across multiple services — the credential model needs to evolve. Kontext is early infrastructure for what will eventually be mandatory: agent-scoped, time-bounded access. The .env.kontext file being safely committable to the repo is the real unlock for teams sharing configurations without sharing secrets.”
The Creator
Content & Design
“A developer security tool requiring understanding of OIDC, token exchange, and system keyring storage to use correctly. It's solving a real problem, but not one most creators encounter. The README will feel overwhelming if you're not a security engineer. The payoff is real, but so is the setup cost.”
Community Sentiment
“Debate over whether threat model is realistic for solo devs; security engineers enthusiastic”
“r/netsec interested; r/LocalLLaMA mostly shrugged — local-first tools have less credential exposure”
“'Commit your .env.kontext safely' message resonated with teams burned by accidental secret commits”