Agent Vault – Open-source credential proxy and vault for agents
FrameworkFreeHey HN! Today we're launching Agent Vault - an open source HTTP credential proxy and vault for AI agents. Repo is at https://github.com/Infisical/agent-vault, and there's an in-depth description at https://infisical.com/blog/agent-vault-the-open-sour
Capabilities11 decomposed
credential-interception-and-proxying
Medium confidenceIntercepts credential requests from AI agents at runtime and routes them through a centralized proxy layer that validates, masks, and logs access patterns. Implements a man-in-the-middle architecture for credential flows, allowing agents to request secrets by logical name rather than storing or managing raw credentials directly, with support for multiple credential backends and rotation policies.
Implements a lightweight proxy-based architecture specifically designed for AI agents rather than general-purpose secret management, with agent-aware request routing and built-in support for agent identity verification and capability-based access control policies
Lighter and more agent-focused than HashiCorp Vault (no complex policy language learning curve) and more purpose-built than generic secret managers, with native support for agent authentication patterns and credential request logging
agent-identity-and-authentication
Medium confidenceEstablishes cryptographic identity for each AI agent through a registration and authentication system that issues agent-specific tokens or certificates. Uses these identities to enforce access policies, ensuring only authorized agents can request specific credentials, with support for multiple authentication methods (API keys, mTLS, JWT tokens) and identity lifecycle management.
Implements agent-specific identity binding rather than generic service accounts, with built-in support for agent metadata (model type, deployment environment, capabilities) that can inform access policies and audit decisions
More granular than simple API key authentication (which treats all requests equally) and simpler than full PKI infrastructure, providing agent-aware identity without operational complexity
credential-encryption-at-rest-and-in-transit
Medium confidenceEncrypts credentials at rest in the vault storage and in transit between agents and the proxy using industry-standard encryption (AES-256, TLS 1.3). Supports key management including key rotation, and can optionally use external key management services (AWS KMS, Azure Key Vault) for key storage. Encryption is transparent to agents.
Implements transparent encryption that doesn't require agent-side changes, with support for external key management services, rather than requiring agents to handle encryption themselves
More practical than unencrypted credential storage and more flexible than single-key encryption that doesn't support key rotation
credential-access-policy-enforcement
Medium confidenceEvaluates fine-grained access policies at request time to determine whether an authenticated agent is authorized to access a specific credential. Policies are defined declaratively (e.g., 'agent X can access credentials tagged with environment=prod') and evaluated against agent identity, credential metadata, and contextual attributes, with support for policy versioning and audit logging of policy decisions.
Implements attribute-based access control (ABAC) specifically for agent-credential relationships, allowing policies to reference agent capabilities, deployment environment, and credential sensitivity level rather than just agent identity
More flexible than role-based access control (RBAC) for dynamic agent environments and more practical than full attribute-based systems that require extensive metadata management
multi-backend-credential-storage-abstraction
Medium confidenceProvides a unified interface to multiple credential storage backends (Infisical, HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, etc.) through a pluggable adapter pattern. Agents request credentials by logical name without knowing which backend stores them, and the proxy handles backend-specific authentication, retrieval, and error handling transparently.
Implements a lightweight adapter pattern specifically for credential backends rather than a heavy abstraction layer, allowing new backends to be added with minimal code while maintaining agent-side simplicity
Simpler than building agents with native support for multiple backends and more practical than generic secret management abstractions that don't account for agent-specific credential usage patterns
credential-request-logging-and-audit
Medium confidenceCaptures detailed logs of every credential request including agent identity, requested credential, timestamp, access decision (allowed/denied), and response metadata. Logs are structured (JSON) and can be exported to external logging systems (ELK, Splunk, CloudWatch) for analysis, compliance reporting, and security investigation. Supports log retention policies and filtering.
Implements agent-centric audit logging that captures agent identity and capabilities alongside credential access, enabling security analysis specific to agent behavior rather than generic secret access logs
More detailed than backend-native logging (which may not capture agent identity) and more focused than generic audit systems that don't understand agent-credential relationships
credential-rotation-and-lifecycle-management
Medium confidenceManages credential lifecycle including creation, rotation, and expiration through scheduled policies and manual triggers. When a credential is rotated, the proxy updates the stored value and can optionally notify agents or invalidate cached credentials, ensuring agents always access current credentials without manual intervention. Supports rotation scheduling (e.g., every 90 days) and rotation history tracking.
Implements agent-aware credential rotation that can notify agents of credential changes and invalidate cached values, rather than just rotating credentials in the backend without agent coordination
More practical than manual rotation (which is error-prone and doesn't scale) and more agent-focused than backend-native rotation that doesn't account for agent caching or notification
agent-sdk-and-http-client-integration
Medium confidenceProvides SDKs (likely in Python, JavaScript/TypeScript, Go) and HTTP client libraries that agents use to request credentials from the vault proxy. SDKs handle authentication, error handling, credential caching (optional), and retry logic, abstracting away the proxy protocol details. Supports both synchronous and asynchronous credential requests.
Provides language-specific SDKs optimized for agent use cases (async support, built-in retry logic, optional caching) rather than generic HTTP clients, reducing boilerplate and improving agent code clarity
Simpler than agents implementing HTTP clients directly and more agent-focused than generic secret management SDKs that don't account for agent-specific patterns
credential-metadata-and-tagging
Medium confidenceAllows credentials to be tagged with metadata (environment, sensitivity level, owner, rotation policy, etc.) that can be used for access control policies, filtering, and organization. Metadata is queryable and can be used to implement dynamic access policies (e.g., 'agents can access credentials tagged with their environment'). Supports custom metadata fields.
Implements credential metadata as a first-class concept that integrates with access policies and audit logging, rather than optional annotations, enabling metadata-driven security decisions
More practical than flat credential lists and more flexible than rigid credential hierarchies, allowing organizations to define their own metadata schemes
vault-service-deployment-and-configuration
Medium confidenceProvides deployment options (Docker container, standalone binary, Kubernetes Helm chart) and configuration management for the vault service itself. Supports configuration via environment variables, config files, or API, with hot-reload for non-critical settings. Includes health checks, metrics export, and integration with container orchestration platforms.
Provides multiple deployment options (Docker, binary, Kubernetes) with first-class support for container orchestration, rather than requiring custom deployment scripts or infrastructure-as-code
Simpler to deploy than HashiCorp Vault (which has more complex setup) and more flexible than SaaS-only solutions that don't support self-hosted deployment
credential-request-rate-limiting-and-throttling
Medium confidenceImplements rate limiting and throttling on credential requests to prevent abuse, excessive load, or denial-of-service attacks. Supports per-agent rate limits, per-credential rate limits, and global rate limits, with configurable thresholds and backoff strategies. Rejected requests return appropriate error codes and guidance for retry.
Implements agent-aware rate limiting that can distinguish between legitimate high-frequency agents and misbehaving agents, rather than simple global rate limits that treat all requests equally
More practical than no rate limiting (which allows abuse) and more flexible than fixed global limits that don't account for agent-specific usage patterns
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with Agent Vault – Open-source credential proxy and vault for agents, ranked by overlap. Discovered automatically through the match graph.
@agentic-name-service/sdk
Official Agent SDK for the Agentic Name Service (ANS) — orchestrates MCP tool calls across Gateway and Guardian for trilateral authentication
A2A
Agent2Agent (A2A) is an open protocol enabling communication and interoperability between opaque agentic applications.
AutoGPT
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
cordon-cli
The security gateway for AI agents — firewall, auditor, and remote control for MCP tool calls
ALAPI
** - ALAPI MCP Tools,Call hundreds of API interfaces via MCP
Best For
- ✓teams deploying multiple AI agents in production environments
- ✓organizations with strict credential governance and compliance requirements
- ✓developers building multi-tenant agent systems where credential isolation is critical
- ✓multi-agent deployments where credential access must be strictly isolated by agent
- ✓regulated industries requiring agent identity audit trails
- ✓teams managing agent lifecycles with frequent onboarding and offboarding
- ✓security-conscious organizations handling sensitive credentials
- ✓regulated industries requiring encryption at rest and in transit
Known Limitations
- ⚠Adds network latency for every credential request (typically 10-50ms per lookup depending on backend)
- ⚠Requires all agents to be configured to use the proxy endpoint rather than direct credential access
- ⚠No built-in support for hardware security modules (HSMs) — credential storage depends on underlying vault backend
- ⚠Credential caching at agent level must be managed externally; proxy does not provide client-side caching
- ⚠Agent identity must be provisioned out-of-band before the agent can authenticate
- ⚠No automatic agent discovery — each agent requires explicit registration
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
About
Show HN: Agent Vault – Open-source credential proxy and vault for agents
Categories
Alternatives to Agent Vault – Open-source credential proxy and vault for agents
Search the Supabase docs for up-to-date guidance and troubleshoot errors quickly. Manage organizations, projects, databases, and Edge Functions, including migrations, SQL, logs, advisors, keys, and type generation, in one flow. Create and manage development branches to iterate safely, confirm costs
Compare →Are you the builder of Agent Vault – Open-source credential proxy and vault for agents?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →