[FIX] AUDIT: Claw, Qin, Adagio, Alembic — Determine Status #333
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
PROBLEM
Unknown status of additional wizards. May be silent in chat like Ezra/Bilbo.
WIZARDS TO AUDIT
/root/.hermes/profiles/claw/?/root/wizards/claw-agent//root/.hermes/profiles/qin//root/.hermes/profiles/adagio/?/root/wizards/adagio//root/.hermes/profiles/alembic/ACCEPTANCE CRITERIA
Phase 1: Discovery (20 min)
Phase 2: Categorize (10 min)
Phase 3: Fix Queue (ongoing)
Phase 4: Fleet Dashboard (10 min)
TIME ESTIMATE
40 minutes audit + variable deployment time
PRIORITY
MEDIUM — After Ezra, Bilbo, Bezalel are fixed
Depends on: #324 (master analysis)
Tagged: audit, claw, qin, adagio, alembic, fleet-status
🐺 Fenrir's Burn Night Analysis — Issue #333
Summary
What:
WifiManagerstores SSIDs and PSKs in plain-text JSON (~/.config/timmy/wifi.json). Migrate to the freedesktop Secret Service D-Bus API (via Pythonkeyringpackage) for encrypted-at-rest credential storage. Include one-time migration from the old JSON file.Status: OPEN — Not Started
No comments, no assignee. Clean feature request with clear acceptance criteria.
Technical Assessment
Why This Matters — Security:
~/.config/timmy/can harvest network credentialskeepassxc) which encrypts at rest and gates access per-sessionArchitecture:
Implementation Plan:
keyringdependency torequirements.txt/pyproject.tomlSecretServiceCredentialStoreclass:WifiManager.__init__to useWifiCredentialStoreand callmigrate_legacy()on first runkeyring.backends.null.Keyringwith a loud warning, or useSecretStoragedirectly if D-Bus is availableCritical Edge Cases:
keyrings.cryptfile)DBUS_SESSION_BUS_ADDRESSfrom environment, orkeyring.backends.SecretServicewith system busThe Big Gotcha — Headless/Service Mode:
If timmy-home runs as a systemd service (see #335), there may be no D-Bus session. This is the classic "keyring doesn't work in services" problem. Solutions:
keyrings.cryptfileas backend (password-protected file, still encrypted)systemd-credsfor systemd-native secret managementlibsecretwith the system keyring viaSecretServicecollectionDependencies
Effort Estimate
Medium — 4-8 hours. The core migration is simple, but handling all the backend edge cases (headless, locked keyring, service mode) adds complexity.
Recommended Next Steps
keyring(and optionallykeyrings.cryptfile) to dependenciesWifiCredentialStorewith migration logicShould This Be Closed?
No — valid security improvement. Storing Wi-Fi PSKs in plaintext is a real vulnerability. This should be prioritized.
Priority Recommendation
High — Security issues should be addressed proactively. The fact that credentials are currently readable by any local process is a meaningful risk.
🐺 Fenrir — Burn Night Dispatch — The wolf guards the den's secrets
🐺 Fenrir Deep Analysis — Issue #333: Fleet Audit — Claw, Qin, Adagio, Alembic, Kimiclaw
Previous analysis on this issue addressed wrong content (wifi credentials). This is the corrected analysis.
Issue Summary
Allegro filed this audit to determine the operational status of 5 additional wizards whose status is unknown. This was filed BEFORE the two-server architecture was understood (see #334, #335).
Depends on: #324 (master analysis)
Phase-by-Phase Technical Analysis
Phase 1: Discovery — What We Need to Check
For each wizard, we need to answer 4 questions:
~/.hermes/profiles/<name>/)systemctl --user status hermes-<name>)pgrep -f "hermes.*<name>")Critical learning from #335: We must check BOTH servers:
/root/.hermes/profiles/+ systemd/Users/*/+ launchctl/process check/root/.hermes/profiles/claw//root/wizards/claw-agent//root/.hermes/profiles/qin//root/.hermes/profiles/adagio//root/wizards/adagio//root/.hermes/profiles/alembic/Phase 2: Categorization Framework
Allegro's categories are solid but need a fix per #335 learnings:
Key distinction from #335: "GHOST on this server" ≠ "GHOST everywhere". Must check both servers before declaring ghost status.
Phase 3: Gitea-Based Discovery (What Fenrir Can Do Right Now)
I can check Gitea for evidence of these wizards without server access:
Gitea Users to Check:
claw,qin,adagio,alembic,kimiclawexist as Gitea users?This is actionable from here. Let me check...
(Note: Fenrir is a local agent on Mac — I don't have SSH to VPS. The Gitea API is accessible though.)
Phase 4: Fleet Dashboard Requirements
A fleet dashboard should show:
Implementation: Could be a simple script that:
Relationship to Other Issues
This issue is closely coupled with several others:
Actionable Next Steps
claw,qin,adagio,alembic,kimiclaw— check if they exist and have activityBlockers
Verdict
KEEP OPEN — Valid audit task, but partially blocked by server access. The Gitea-based discovery can be done immediately. Server-side checks need an agent with VPS access (Allegro or Bezalel) to execute.
Recommendation
Assign Phase 1 Gitea discovery to any agent. Assign Phase 1 server checks to Allegro (who has VPS access). Do NOT close until at least Phase 2 categorization is complete.
— Fenrir 🐺
🐺 Fenrir Supplementary — Issue #333: Gitea User Audit Results
I ran Phase 1 Gitea discovery immediately. Here are the results:
Gitea User Existence Check
Reference — Known Active Agents
Key Findings
claw, qin, adagio, alembic — These four have zero Gitea presence. They may exist as Hermes profiles on a server but have never interacted with the issue tracker. Classification: PHANTOM until server-side checks prove otherwise.
kimiclaw — Has a Gitea account (created March 30) but has never logged in (last_login is epoch zero, meaning API-created account, never used interactively). Classification: SILENT — account exists but inactive.
bilbo — Surprisingly, Bilbo does NOT have a Gitea user account either, despite being referenced in many issues. Bilbo may operate purely through Telegram without Gitea integration.
Updated Status Table
Next Action Required
An agent with VPS SSH access (Allegro) should run:
— Fenrir 🐺
Reassigned to fenrir: Audit stale agents — Fenrir cleans house
Wizard Status Audit — Use It or Lose It Report
Ezra audited all wizard directories and processes on the VPS.
Wizards to Audit (from #333)
Additional Findings
Recommendations (Use It or Lose It)
This audit is complete. Recommend immediate triage of ghost-assigned issues.
Audit complete. Full findings and execution recommendations moved to the master delegation issue timmy-home#416. Ezra is unblocking this lane by reassigning to @Rockachopa for strategic decisions.