Credential is a sensitive value stored in a vault that Agent Vault attaches to proxied requests. This can be an API key, database credential, password, or any other sensitive material.
Each credential has:
- Key: An
UPPER_SNAKE_CASEname (e.g.STRIPE_KEY,GITHUB_TOKEN) for the credential. This is used to reference the credential in services. - Value: The credential material, encrypted at rest with AES-256-GCM. Values are only decrypted in memory at proxy time.
Credential values are encrypted at rest and only decrypted in memory when
needed. Vault members and admins can read credential values via
vault credential get or vault credential list --reveal. Agents with the
proxy role cannot read credential values — they are only injected at proxy
time.- Automatically: When an agent needs access to a new service, it can raise a proposal that includes the credential slots it needs. You review the proposal, provide the credential values, and approve. This is the recommended workflow for working with Agent Vault.
- Manually: You can set credentials directly via the CLI before inviting agents. This is useful for pre-configuring a vault with known service credentials.
Store a credential
vault credential command (alias: vault creds) uses KEY=VALUE format. Multiple credentials can be set at once (e.g. agent-vault vault credential set A=1 B=2). If STRIPE_KEY already exists, it is overwritten.
Delete a credential
Credentials via proposals
Credentials via proposals
Agents can propose new credentials through proposals
without ever handling the actual values. There are two flows:Agent needs a credential from you: The agent creates a proposal with a
credential slot (key name, description, and optionally an Agent generated a credential: If the agent created an API key or
received a token during a workflow, it can include the Each credential slot has an
obtain URL with
instructions). You receive a browser link, enter the value, and click
“Allow”. The credential is stored encrypted on approval.value field in the
proposal. You review the proposal and confirm the value is correct before it
is stored.action field: set (add or replace) or delete
(remove). Approval atomically applies all credential changes in a single
transaction.Deleting credentials via proposals
Deleting credentials via proposals
Agents can also propose removing credentials they no longer need:Delete-action slots only require the
key field. The credential is removed
when you approve the proposal.