Agents Machine

Vault

Encrypted secrets management with AES-256-GCM encryption and audit trail.

The Vault provides secure, encrypted storage for API keys, tokens, passwords, and certificates. All secrets are encrypted at rest using AES-256-GCM with full audit trail.

Security Features

🔐 AES-256-GCM

Military-grade encryption at rest for all stored secrets.

📝 Audit Trail

Every access is logged with timestamp and accessor identity.

🏗️ Project Isolation

Secrets are scoped to individual projects — no cross-contamination.

🚫 No Exposure

Values never appear in logs, errors, or API responses.

Storing Secrets

Store secret GITHUB_TOKEN with value ghp_xxxxxxxxxxxx
Category: token
Description: GitHub personal access token for CI

Retrieving & Listing

Get secret GITHUB_TOKEN

Every retrieval is logged in the audit trail. Only retrieve secrets when necessary.

View all stored secrets (values are never shown):

List all secrets
List secrets in category api_key

Output shows: key name, category, masked value (ghp_****xxxx), description, and last accessed timestamp.

Delete secret GITHUB_TOKEN

Skill Integration

Skills automatically inject vault secrets at runtime via environment mapping:

Define Env Mapping ``` Create skill "deploy-notify": Required env:

SLACK_WEBHOOK Env mapping: SLACK_WEBHOOK → SLACK_DEPLOY_URL ```

Best Practices

Follow these guidelines for optimal security:
  1. Use descriptive key namesPROD_DB_PASSWORD not PW1
  2. Categorize properly — Helps with filtering and auditing
  3. Add descriptions — Future you will thank present you
  4. Rotate regularly — Update secrets on a schedule
  5. Minimize access — Only retrieve secrets when needed
  6. Use env mapping — Let skills inject secrets automatically instead of manual retrieval

On this page