Target servers don't need SSH keys — use public HTTP endpoint for unauthenticated clone during install. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Target servers don't need SSH keys — use public HTTP endpoint for unauthenticated clone during install. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>