- a key/value store for secrets (like a hosted
.env) - with access grants for agents
- with auditing for every access
- with optional proxy/injection so agents can call external APIs without ever seeing plaintext credentials
What you can store
Vault is provider-agnostic. A secret is just a key/value pair. Common patterns:- Single API key
OPENAI_API_KEY=...
- A “secret set” (remote env file)
STRIPE_SECRET_KEY=...STRIPE_WEBHOOK_SECRET=...STRIPE_ACCOUNT_ID=...
- Service-specific bundles
- AWS:
AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY,AWS_REGION - GitHub:
GITHUB_TOKEN
- AWS:
Core concepts
Secret set
A secret set is a named collection of key/value entries. Recommended naming:provider:openai,stripe,github,customenvironment:dev,staging,prodname:default,billing-bot,data-pipeline
provider=stripe,environment=prod,name=billing-bot
Grants (who can use it)
A grant defines which agent(s) can use a secret set and under what constraints. Typical grant constraints:- allow specific agents only
- optional allowlist of keys inside the secret set
- allowed actions (recommended default: proxy use, not export)
- TTL (time bound permissions)
- optional rate/spend constraints (enforced when possible)
Leases (capability tokens)
When an agent needs to use a secret set, Clawb issues a short-lived lease:- request-scoped (single-use) — recommended default
- workflow-scoped (multi-use within constraints) — for long-running workflows
- agent identity
- secret set
- permitted action(s)
- expiry (short TTL)
Security model (high level)
Encryption
- Secrets are encrypted at rest.
- Keys are rotated over time.
- Secrets are versioned (you can roll back safely).
No-plaintext by default
By default:- Vault APIs do not return plaintext secret values.
- Approved agent usage happens via proxy/injection.
Auditing
Every relevant event is audited:- secret set create/update/delete (soft delete)
- grant changes
- lease minting
- lease usage (secret accessed)
- log which keys were used and when, not the secret values.
Recommended default: proxy/injection (agents never see keys)
Instead of giving an agent a secret, Clawb can act as a credential injection proxy:- agent requests a lease to perform an action
- agent sends the outbound request to Clawb (with the lease)
- Clawb injects the secret server-side and forwards to the external provider
- agents can’t exfiltrate raw keys
- revocation is immediate
- auditing is straightforward