Here are two examples using that:
varlinkctl introspect /run/systemd/io.systemd.Credentials
and
varlinkctl call /run/systemd/io.systemd.Credentials io.systemd.Credentials.Encrypt '{"text":"foobar"}'
The 2nd argument always specifies the entrypoint socket to talk to. In most cases where you call this locally that's the file system path of an AF_UNIX socket. However this can also be the path to an executable, in which case the executable is invoked and told via $LISTEN_FDNAMES (i.e.
the usual systemd socket activation protocol) that it shall respond to Varlink queries via a passed in socket fd.
The path may also be prefixed with "ssh-unix:" in which case an SSH connection is made to some remote Varlink service.
New with v257 is that "ssh-exec:" is now also available which also sets up an SSH connection, but invokes a specified binary on the remote side, talking to it via standard input/output.
All four ways to communicate (connect to AF_UNIX socket, execute binary, …