Loading...
Loading...
Manages TrueFoundry personal access tokens (PATs). List, create, and delete tokens for API auth, CI/CD, and gateway access.
npx skill4agent add truefoundry/tfy-agent-skills access-tokens<objective>Routing note: For ambiguous user intents, use the shared clarification templates in references/intent-clarification.md.
statusTFY_BASE_URLTFY_API_KEYTFY_API_SHscripts/tfy-api.shreferences/tfy-api-setup.mdtfy_access_tokens_list()TFY_API_SH=~/.claude/skills/truefoundry-access-tokens/scripts/tfy-api.sh
# List all personal access tokens
$TFY_API_SH GET /api/svc/v1/personal-access-tokensPersonal Access Tokens:
| Name | ID | Created At | Expires At |
|---------------|----------|-------------|-------------|
| ci-pipeline | pat-abc | 2025-01-15 | 2025-07-15 |
| dev-local | pat-def | 2025-03-01 | Never |tfy_access_tokens_create(payload={"name": "my-token"})# Create a new personal access token
$TFY_API_SH POST /api/svc/v1/personal-access-tokens '{"name":"my-token"}'Security: Token Display Policy
- Display the token value exactly once from the API creation response so the user can copy it.
- After displaying, instruct the user to store it in a secure location immediately.
- The agent must NEVER store, log, or re-display the token value after the initial creation response.
- If the user asks to see the token again later, instruct them to create a new token.
Token created successfully!
Name: my-token
Token: <value from API response — shown once>
⚠️ Save this token NOW — it will not be shown again.
Store it in a password manager, CI/CD secret store, or TrueFoundry secret group.
Never commit tokens to Git or share them in plain text.tfy_access_tokens_delete(id="TOKEN_ID")# Delete a personal access token
$TFY_API_SH DELETE /api/svc/v1/personal-access-tokens/TOKEN_IDai-gatewaygitopsdeploystatussecretsreferences/api-endpoints.mdCannot manage access tokens. Check your API key permissions.Token ID not found. List tokens first to find the correct ID.A token with this name already exists. Use a different name.If services fail after token deletion, they were using the deleted token.
Create a new token and update the affected services/pipelines.Token values are only shown at creation time. If lost, delete the old token
and create a new one, then update all services that used the old token.