HorizonFlowLive Profile Banner
Horizon Flow Profile
Horizon Flow

@HorizonFlowLive

Followers
15
Following
55
Media
2
Statuses
36

Building open source tools for Ai Agents | Developer at 🛡️ Vault-0 🦞 Opensource secret Manager for OpenClaw

Joined October 2024
Don't wanna be here? Send us removal request.
@DigitalLawrence
Digital
8 days
Holy shit. Cursor's own agent + IDE costs $200/mo and leaks 7–30GB RAM on Claude workflows? 😤 Devs want Claude Code's agentic CLI power... but in a real IDE, not raw terminal or bloated paid junk. Clif is the open-source IDE built for Claude Code: launches agents via Claude
5
3
10
@HorizonFlowLive
Horizon Flow
18 days
OpenClaw Finance Brain 🧠
@strykrai
Strykr.ai
18 days
Prism is about to supercharge @OpenClaw agents. AI agents are getting smarter. But when it comes to financial asset resolution, they’re still guessing. Here’s a look inside the Prism API dashboard 👇
0
0
1
@HorizonFlowLive
Horizon Flow
18 days
This is how quickly you can Install @openclaw with the open source Vault-0 Install Wizard. It's 3 clicks and 20 seconds, check the video. Opensource, and looking for contributors Built in Rust & Tauri https://t.co/DACzwnHNxg
2
16
19
@HorizonFlowLive
Horizon Flow
18 days
This is how quickly you can Install @openclaw with the open source Vault-0 Install Wizard. It's 3 clicks and 20 seconds, check the video. Opensource, and looking for contributors Built in Rust & Tauri https://t.co/DACzwnHNxg
2
16
19
@HorizonFlowLive
Horizon Flow
20 days
Introducing Vault-0 -- the open-source security layer for @OpenClaw agents. Zero plaintext API keys. Policy-controlled actions. Native x402 payments. Tamper-evident audit trail. Your ClawBot shouldn't touch raw secrets. Now it doesn't have to. Thread 🧵
6
11
18
@DigitalLawrence
Digital
20 days
1 Click Local Install and Security Hardening for @openclaw
@HorizonFlowLive
Horizon Flow
20 days
Introducing Vault-0 -- the open-source security layer for @OpenClaw agents. Zero plaintext API keys. Policy-controlled actions. Native x402 payments. Tamper-evident audit trail. Your ClawBot shouldn't touch raw secrets. Now it doesn't have to. Thread 🧵
3
7
15
@HorizonFlowLive
Horizon Flow
20 days
0
0
2
@HorizonFlowLive
Horizon Flow
20 days
Vault-0 is open source and built for the OpenClaw ecosystem. If you're running ClawBot agents and want to stop leaving API keys in plaintext, this is for you. Star the repo. Try it. Break it. PRs welcome. https://t.co/DACzwnHNxg End Thread 🧵
Tweet card summary image
github.com
Vault-0: Agent Security, Monitor & x402 Wallet for OpenClaw. Encrypted secret vault, real-time agent monitor, policy enforcement, and native x402 payments — built with Rust + Tauri. - 0-Vau...
1
2
8
@HorizonFlowLive
Horizon Flow
20 days
Tech stack for the curious: 1) Tauri 2 + Svelte + Tailwind (frontend) 2) Axum proxy, alloy EVM signer, argon2/aes-gcm vault (Rust backend) 3) Embedded terminal via xterm.js + tauri-pty 4) Native performance. No Electron. ~15MB binary. 9/
1
0
4
@HorizonFlowLive
Horizon Flow
20 days
The guided setup flow: 1) Launch Vault-0 -- it detects your OpenClaw installation automatically 2) Scans for plaintext keys in existing configs 3) Migrates them into the encrypted vault 4) Hardens your ClawBot with secure aliases and policies 5) Launches the daemon, then
1
0
4
@HorizonFlowLive
Horizon Flow
20 days
The evidence ledger is a SHA-256 chained log of every proxied request, policy decision, and payment. Export tamper-evident receipts. Know exactly what your agent did, when, and why it was allowed. Full accountability for autonomous agents. 7/
1
0
4
@HorizonFlowLive
Horizon Flow
20 days
MCP hardening out of the box: 1) Allowlisted MCP server origins only 2) SSRF mitigation (private/internal IPs blocked) 3) Token passthrough disabled -- the proxy never forwards your client tokens to MCP servers If you're running MCP tools with your ClawBot, this matters. 6/
1
1
4
@HorizonFlowLive
Horizon Flow
20 days
Built-in x402 payment support. When an API returns HTTP 402 Payment Required, Vault-0 handles it natively: 1) Parses the 402 response (amount, recipient, network) 2) Signs via EIP-3009 with your on-device EVM wallet 3) Auto-settles if policy allows 4) Logs everything to the
1
0
5
@HorizonFlowLive
Horizon Flow
20 days
The local proxy at 127.0.0.1:3840 enforces policies on every outbound request: 1) Domain allow/block lists 2) HTTP method restrictions 3) Spend caps on x402 payments 4) Output redaction (keys never leak into logs) 5) Auto-settle rules for x402 payments 6) YAML-based. Auditable.
1
0
4
@HorizonFlowLive
Horizon Flow
20 days
How it works: 1) Secrets live in an AES-256-GCM encrypted vault (Argon2id key derivation) 2) At launch, Vault-0 writes an ephemeral .env, restarts the daemon, then zeros the file 3) Keys exist on disk for ~2 seconds -- just long enough for the process to load 4) After that,
1
0
5
@HorizonFlowLive
Horizon Flow
20 days
The problem: every AI agent framework stores API keys in .env files or config YAML. One leaked log, one bad plugin, one prompt injection -- and your keys are gone. Vault-0 eliminates this entirely. Agents never see your secrets. Period. 2/
1
0
4
@HorizonFlowLive
Horizon Flow
20 days
Introducing Vault-0 -- the open-source security layer for @OpenClaw agents. Zero plaintext API keys. Policy-controlled actions. Native x402 payments. Tamper-evident audit trail. Your ClawBot shouldn't touch raw secrets. Now it doesn't have to. Thread 🧵
6
11
18
@HorizonFlowLive
Horizon Flow
1 month
testing…
0
0
0