Secure secrets proxy for AI agents — manages API keys so agents never see raw credentials.
{
"mcpServers": {
"io-github-rsdouglas-janee": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Secure secrets proxy for AI agents — manages API keys so agents never see raw credentials.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 18 days ago. 27 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
Context cost
2 tools. ~300 tokens (0.2% of 200K).
No automated test available for this server. Check the GitHub README for setup instructions.
executeMake API requests through Janee with injected credentials. Agent never sees the raw API key.
janee_execExecute CLI commands with injected credentials as environment variables. Credential never enters agent context.
This server is missing a description.If you've used it, help the community.
Add informationNo known vulnerabilities.
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.