Dedicated user, read-only credentials, scoped access. Deploy h-cli the way you'd deploy any monitoring tool.
On every server, router, or switch that h-cli will connect to, create a dedicated unprivileged user. This is not for the h-cli container — it's for the remote devices h-cli manages.
Create read-only users on your network devices. h-cli doesn't need write access to provide massive value.
Create scoped, read-only tokens for your tools. h-cli can query without modifying anything.
On the server where h-cli's containers run, restrict outbound access. Only allow connections to the systems it needs.
h-cli is the AI interface, not the security boundary.
Deploy it like any monitoring tool: read-only credentials, scoped access, restricted source IPs. The Asimov Firewall adds safety — your network controls enforce it.
Store your credentials in an environment file with restricted permissions. Never commit this to git.
Built-in credential scrambler
h-cli includes a credential scrambler that replaces all sensitive values with variable names before they reach the LLM. The AI never sees your actual passwords, tokens, or keys — it only works with references like $NETBOX_TOKEN and $HSSH_KEY. The real values are injected at execution time, outside the LLM context.
h-cli is free and open source. Set up in minutes, start querying your infrastructure immediately.