yaak-cli
Installation
SKILL.md
Yaak CLI
Use this skill when the user mentions Yaak or yaak, or when you need to inspect or send requests stored in the shared Yaak workspace.
Safety Rules
- Treat Yaak GUI and CLI as sharing the same saved workspace data.
- Do not inspect, print, or expand authentication tokens from requests, folders, or inherited parent folders unless the user explicitly asks.
- Do not use
yaak -vor--verbose. Verbose mode prints request headers. - Assume inherited auth on parent folders is correct unless the user explicitly asks you to debug auth.
- Never run raw
yaak request show <request_id>or rawyaak folder show <folder_id>in user-facing work when auth may be present. Always sanitize those outputs withjq. - If you need to inspect a request definition, sanitize auth fields:
yaak request show <request_id> | jq 'del(.authentication, .authenticationType)'
If you need to inspect a folder definition, sanitize auth fields:
yaak folder show <folder_id> | jq 'del(.authentication, .authenticationType)'
Prohibited by default:
yaak -v send <request_id>yaak request show <request_id>withoutjqyaak folder show <folder_id>withoutjq- any workflow that tries to reveal inherited bearer tokens just to confirm they exist
Discovery Flow
Start with:
yaak workspace list
yaak folder list <workspace_id>
yaak request list <workspace_id>
yaak environment list <workspace_id>
Useful detail commands:
yaak workspace show <workspace_id>
yaak folder show <folder_id> | jq 'del(.authentication, .authenticationType)'
yaak request show <request_id> | jq 'del(.authentication, .authenticationType)'
yaak environment show <environment_id>
Safe Send Workflow
Prefer non-verbose sends and explicitly pick the environment when variables are involved.
yaak -e <environment_id> send <request_id>
Observed behavior:
- non-verbose
yaak sendprints the response body only yaak -v sendprints request headers and must be avoided around real tokens
When validating CLI control, prefer this order:
- read-only unauthenticated request
- read-only authenticated request with
-e <environment_id> - negative-case request expected to return
400or404
Use read-only requests first when validating CLI control, such as GET list or GET fetch requests. Avoid sending folder or workspace IDs unless the user explicitly wants batch execution.
Common Commands
List and inspect:
yaak workspace list
yaak request list <workspace_id>
yaak folder list <workspace_id>
yaak environment list <workspace_id>
Create resources:
yaak workspace create --name "My Workspace"
yaak request create <workspace_id> --name "Ping" --method GET --url "https://example.com"
yaak environment create <workspace_id> --name "local"
Schemas for automation:
yaak workspace schema
yaak environment schema
yaak request schema http
Notes
- Template variable syntax is
${[ my_var ]}, not{{ my_var }} - Requests can inherit data from parent folders, including auth and variables
yaak send <id>accepts request IDs, folder IDs, and workspace IDs- For manual API coverage reviews, compare route definitions in code with
yaak request list <workspace_id>and identify missing endpoints or missing negative-case requests