Overview
The Secrets Manager lets you store sensitive values (API keys, tokens, passwords) that agents can use without seeing the raw values.Creating Secrets
Using Secrets
In Deployments
Configure which secrets a deployment can access:In Sandbox Commands
In Agent Logs
Agents see masked values:Managing Secrets
Parameter Injection
Pass runtime parameters to agents:Secret Scopes
Restrict secrets to specific environments:Security
Encryption
- Secrets are encrypted at rest using AES-256
- Decrypted only when needed during execution
- Never stored in logs or transmitted to clients
Access Control
- Secrets are scoped to your organization
- Only authorized deployments can access secrets
- Audit log tracks all secret access
Rotation
CLI Reference
Best Practices
Use descriptive names
Use descriptive names
DATABASE_URL not DB. STRIPE_SECRET_KEY not SK.Rotate regularly
Rotate regularly
Update secrets periodically, especially after team changes.
Limit access
Limit access
Only grant secrets to deployments that need them.
Use scopes
Use scopes
Separate production and test secrets.
Never log secrets
Never log secrets
Ensure your code doesn’t accidentally log secret values.