Skip to content

Commit 790601c

Browse files
kevin1chunclaude
andcommitted
docs: clarify that AI agents never see auth tokens
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1 parent 6d4ab83 commit 790601c

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,7 @@ const portfolio = await client.buildHoldings();
173173

174174
## Safety
175175

176+
- **Tokens are never exposed to the AI agent** — authentication is handled entirely within the MCP server process; the agent only sees tool results, never access tokens or credentials
176177
- Fund transfers and bank operations are **blocked** — never exposed
177178
- Bulk cancel operations are **blocked**
178179
- All order placements require explicit parameters (no dangerous defaults)
@@ -291,6 +292,8 @@ This design is resilient to Robinhood UI changes — it doesn't depend on any DO
291292

292293
`Bun.secrets` stores tokens directly in the OS keychain — no intermediate encryption layer needed since the keychain itself provides encryption, access control, and tamper resistance. When `Bun.secrets` is unavailable (CI, headless servers), tokens fall back to a plaintext JSON file with a console warning.
293294

295+
Critically, **the AI agent never sees authentication tokens**. Token storage and HTTP authorization happen entirely within the MCP server process. The agent only receives structured tool results (quotes, positions, order confirmations) — never raw tokens, headers, or credentials. Even if the agent's conversation is logged or leaked, no secrets are exposed.
296+
294297
## Development
295298

296299
```bash

0 commit comments

Comments
 (0)