Security

How AgentKey protects your credentials

AgentKey is a credential management system. Security is not a feature — it is the product. Here is exactly how we handle your data.

Threat model

AgentKey centralizes approval, audit, rotation, and revocation of the credentials your AI agents use. When an agent fetches a credential, it receives the actual secret (API key or token) over TLS. The agent then uses that secret directly against the target service.

This means AgentKey does not eliminate secret exposure at use time. A compromised agent that has been granted access to a tool will be able to read and use that credential until its access is revoked.

What AgentKey does solve

What AgentKey does not solve (yet)

If your threat model requires that agents never see raw secrets, you need a proxy — and AgentKey can sit in front of one to handle approval, audit, and rotation. The two approaches are complementary.

Encryption at rest

All SaaS credentials (API keys, OAuth tokens, bot tokens) and webhook URLs (Slack, Discord) are encrypted using AES-256-GCM before being written to the database.

Credentials are never stored in plaintext. They are never logged. They are never included in database backups in decrypted form.

Key management

The 256-bit encryption key is provided as an environment variable and managed by the hosting platform (Vercel on the managed service, your infrastructure for self-hosted deployments). This is a single-key model — appropriate for the current threat model but without envelope encryption or HSM-backed key storage.

For deployments that require HSM-backed key management or envelope encryption (e.g., SOC 2 Type II, HIPAA), these capabilities are on the roadmap. Contact us at [email protected] if this is a requirement for your organization.

Encryption in transit

All connections to AgentKey use TLS (HTTPS). This includes:

Agent API key management

When you register an agent, AgentKey generates an API key in the format sk_agent_ followed by 24 cryptographically random bytes (base64url encoded).

Credential vending

Agents do not store SaaS credentials. They fetch them on demand via the API:

  1. Agent authenticates with its API key
  2. AgentKey verifies the agent has an approved access grant for the requested tool
  3. The credential is decrypted in memory and returned over TLS
  4. The fetch is recorded in the audit log with timestamp, agent ID, and tool ID

If the agent's access has been revoked, the request returns HTTP 403. Revocation is immediate — there is no cache or delay.

Audit logging

Every action in AgentKey is recorded in an append-only audit log:

Audit logs are queryable and filterable by agent, tool, action type, and date range. They are retained for 30 days on the free tier.

AI features and credential isolation

AgentKey offers AI-powered features (setup guide generation, form drafting). These features process:

Credentials are never sent to AI model providers. The AI features operate exclusively on metadata and public information. There is a hard boundary in the codebase between credential decryption (which only happens during agent API calls) and AI feature processing.

Edge protection — Cloudflare Enterprise

All traffic to AgentKey passes through Cloudflare Enterprise, providing multiple layers of protection before requests reach the application:

TLS configuration

Infrastructure

ComponentProviderRegion
Edge protectionCloudflare Enterprise (WAF, DDoS, TLS)Global (300+ cities)
ApplicationVercel (serverless)us-east-1
DatabaseNeon PostgreSQLus-east-1
AuthenticationClerkUnited States
AI featuresVercel AI GatewayUnited States

Incident response

In the event of a security breach that affects your data:

Responsible disclosure

If you discover a security vulnerability in AgentKey, we ask that you disclose it responsibly:

We will acknowledge receipt within 48 hours and provide an initial assessment within 7 days. We appreciate and credit security researchers who follow responsible disclosure practices.

Rate limiting and abuse prevention

All API endpoints are rate limited to prevent abuse:

HTTP security headers

AgentKey enforces the following security headers on all responses:

What we do not do

Questions

For security questions or concerns, contact [email protected].