spawn/gcp
A 81bab47a74
fix: Escape API keys in continue.sh JSON configs to prevent injection (#374)
Replace vulnerable heredoc patterns across 27 continue.sh scripts with
setup_continue_config() helper that uses json_escape() + upload_config_file()
to safely handle API keys containing special characters like quotes or braces.

Also fix _save_token_to_config() in shared/common.sh which had the same
unescaped heredoc vulnerability for local token storage.

Relates to #104

Agent: security-auditor

Co-authored-by: A <6723574+louisgv@users.noreply.github.com>
Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-02-11 00:13:19 -08:00
..
lib fix: Prevent Python/shell injection via env vars and triple-quote strings (#102) 2026-02-09 10:22:39 -08:00
aider.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
amazonq.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
claude.sh QA-Bot setup (#335) 2026-02-10 19:51:07 -08:00
cline.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
codex.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
continue.sh fix: Escape API keys in continue.sh JSON configs to prevent injection (#374) 2026-02-11 00:13:19 -08:00
gemini.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
goose.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
gptme.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
interpreter.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
kilocode.sh feat: Add kilocode scripts for hetzner, digitalocean, vultr, linode, lambda, aws-lightsail, gcp (#114) 2026-02-09 19:46:21 -08:00
nanoclaw.sh refactor: Extract ENV_TEMP pattern to provider-specific inject functions 2026-02-08 04:15:02 +00:00
openclaw.sh refactor: Document and fix GCP variable export pattern 2026-02-08 03:40:12 +00:00
opencode.sh fix: Use robust OpenCode install method across all clouds (#48) 2026-02-07 23:02:18 -08:00
plandex.sh Add Plandex coding agent with 14 cloud implementations (#36) 2026-02-07 21:35:04 -08:00
README.md fix: Improve CLI error handling, fix bash compat, and update cloud READMEs (#90) 2026-02-09 09:33:57 -08:00

GCP Compute Engine

Google Cloud Compute Engine instances via gcloud CLI. GCP Compute Engine

Uses current username for SSH. Requires gcloud CLI installed and configured.

Agents

Claude Code

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh)

OpenClaw

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/openclaw.sh)

NanoClaw

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/nanoclaw.sh)

Aider

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/aider.sh)

Goose

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/goose.sh)

Codex CLI

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/codex.sh)

Open Interpreter

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/interpreter.sh)

Gemini CLI

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/gemini.sh)

Amazon Q CLI

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/amazonq.sh)

Cline

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/cline.sh)

gptme

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/gptme.sh)

OpenCode

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/opencode.sh)

Plandex

bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/plandex.sh)

Non-Interactive Mode

GCP_INSTANCE_NAME=dev-mk1 \
OPENROUTER_API_KEY=sk-or-v1-xxxxx \
  bash <(curl -fsSL https://openrouter.ai/lab/spawn/gcp/claude.sh)