From 36b6272ea1effede6eeb03526978ac615893c350 Mon Sep 17 00:00:00 2001 From: Max Novak Date: Mon, 20 Apr 2026 20:47:08 +0100 Subject: [PATCH 1/2] feat: add vaulted-fyi/vaulted-mcp-server to Security section --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 3b79332b..7b220ff8 100644 --- a/README.md +++ b/README.md @@ -2039,6 +2039,7 @@ Tools for conducting research, surveys, interviews, and data collection. - [iamredmh/volta-mcp-server](https://github.com/iamredmh/volta-mcp-server) [![volta-mcp-server MCP server](https://glama.ai/mcp/servers/iamredmh/volta-mcp-server/badges/score.svg)](https://glama.ai/mcp/servers/iamredmh/volta-mcp-server) 📇 ☁️ 🍎 🪟 🐧 - Burn-after-read encrypted notes for AI agents. Create and read self-destructing notes via Volta Notes with AES-256-GCM E2E encryption — the decryption key never leaves the URL fragment. Secure credential handoff between users and agents without secrets appearing in chat history. - [zkproofport/proofport-ai](https://github.com/zkproofport/proofport-ai) [![proofport-ai MCP server](https://glama.ai/mcp/servers/zkproofport/proofport-ai/badges/score.svg)](https://glama.ai/mcp/servers/zkproofport/proofport-ai) 📇 ☁️ - Zero-knowledge proof generation MCP server for AI agents. Lets agents prove identity claims (Coinbase KYC, Country, Google OIDC, Google Workspace, Microsoft 365) without revealing personal information. Server-side proving in AWS Nitro Enclave TEE, paid via x402 USDC on Base. Built on Noir circuits (Aztec) and ERC-8004 agent identity. Reference application [OpenStoa](https://github.com/zkproofport/openstoa) won 1st place at The Synthesis Hackathon ("Agents That Keep Secrets" track). +- [vaulted-fyi/vaulted-mcp-server](https://github.com/vaulted-fyi/vaulted-mcp-server) 📇 🏠 🍎 🪟 🐧 - Share encrypted, self-destructing secrets from your AI agent. Zero-knowledge E2E encryption. Agent-blind input sources (env:, file:, dotenv:) keep secrets out of LLM context. ### 🌐 Social Media Integration with social media platforms to allow posting, analytics, and interaction management. Enables AI-driven automation for social presence. From 0980e23c79bb2a24414845a553bb4745bd97570e Mon Sep 17 00:00:00 2001 From: Max Novak Date: Mon, 20 Apr 2026 21:00:05 +0100 Subject: [PATCH 2/2] feat: add Glama badge to vaulted-fyi entry --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 7b220ff8..67b48d15 100644 --- a/README.md +++ b/README.md @@ -2039,7 +2039,7 @@ Tools for conducting research, surveys, interviews, and data collection. - [iamredmh/volta-mcp-server](https://github.com/iamredmh/volta-mcp-server) [![volta-mcp-server MCP server](https://glama.ai/mcp/servers/iamredmh/volta-mcp-server/badges/score.svg)](https://glama.ai/mcp/servers/iamredmh/volta-mcp-server) 📇 ☁️ 🍎 🪟 🐧 - Burn-after-read encrypted notes for AI agents. Create and read self-destructing notes via Volta Notes with AES-256-GCM E2E encryption — the decryption key never leaves the URL fragment. Secure credential handoff between users and agents without secrets appearing in chat history. - [zkproofport/proofport-ai](https://github.com/zkproofport/proofport-ai) [![proofport-ai MCP server](https://glama.ai/mcp/servers/zkproofport/proofport-ai/badges/score.svg)](https://glama.ai/mcp/servers/zkproofport/proofport-ai) 📇 ☁️ - Zero-knowledge proof generation MCP server for AI agents. Lets agents prove identity claims (Coinbase KYC, Country, Google OIDC, Google Workspace, Microsoft 365) without revealing personal information. Server-side proving in AWS Nitro Enclave TEE, paid via x402 USDC on Base. Built on Noir circuits (Aztec) and ERC-8004 agent identity. Reference application [OpenStoa](https://github.com/zkproofport/openstoa) won 1st place at The Synthesis Hackathon ("Agents That Keep Secrets" track). -- [vaulted-fyi/vaulted-mcp-server](https://github.com/vaulted-fyi/vaulted-mcp-server) 📇 🏠 🍎 🪟 🐧 - Share encrypted, self-destructing secrets from your AI agent. Zero-knowledge E2E encryption. Agent-blind input sources (env:, file:, dotenv:) keep secrets out of LLM context. +- [vaulted-fyi/vaulted-mcp-server](https://github.com/vaulted-fyi/vaulted-mcp-server) [![vaulted-fyi/vaulted-mcp-server MCP server](https://glama.ai/mcp/servers/vaulted-fyi/vaulted-mcp-server/badges/score.svg)](https://glama.ai/mcp/servers/vaulted-fyi/vaulted-mcp-server) 📇 🏠 🍎 🪟 🐧 - Share encrypted, self-destructing secrets from your AI agent. Zero-knowledge E2E encryption. Agent-blind input sources (env:, file:, dotenv:) keep secrets out of LLM context. ### 🌐 Social Media Integration with social media platforms to allow posting, analytics, and interaction management. Enables AI-driven automation for social presence.