The secrets gateway built for AI coding agents. Policy-enforced injection into HTTP calls and subprocesses, encrypted audit trail, zero plaintext exposure to the model — ever.
Every team shipping with Claude Code, Cursor, or Cline hits the same three walls — and most never fully close them.
Reading .env, dumping process.env, or asking "paste your token" puts plaintext in the model's context. That context gets logged, replayed, and in many providers — retained.
An agent with your Stripe key can charge anything. With your AWS key it can spin anything. With your shell env it can run anything. There's nothing between "agent decided" and "action happened."
When something goes wrong you get "the model said it deployed" — not a signed, encrypted record of exactly which request, which injection, which response. You can't review what you can't see.
13 features shipped. Every line guarded by 314 tests. Every secret path audited end-to-end.
Agents call http_request, run_command, or list_secrets — and only ever see names and redaction markers, never values.
AES-256-GCM with Argon2id KDF. Master key held in OS keychain (macOS, libsecret, Windows) with headless fallback.
Host allowlist, command+args regex allowlist, forbidden-env-var list, per-secret token-bucket rate limiter.
Every request / response body encrypted at rest. Defense-in-depth scrub at persist and at render. Crash-safe pruning.
CLI and local UI show full req/res, injected secrets, policy decision, timing, rate-limit state — per entry.
Global + per-project override, gitignore-aware discovery. One binary, zero cloud, no telemetry.
Claude, Cursor, Cline — any MCP client calls http_request with a secret name.
Policy check, rate-limit, unlock via keychain, token written into the outbound call.
Encrypted body store, scrub-at-persist and scrub-at-render, forensic detail view.
Both terminals run the exact same prompt: "fetch my Cloudflare zones." Watch what ends up in the agent's context.
Codex asks for a Cloudflare API token, AgenticVault mediates the request, the secret never enters Codex's context, and every call lands in the encrypted audit log you can replay on the CLI or the local UI.
One binary. One command. Your agents get secrets through a policy-enforced gateway from day one — no cloud, no accounts, no telemetry.
127.0.0.1, no exposurePATH, LD_PRELOAD, …)