Skip to content

Infisical/agent-vault

Repository files navigation

Agent Vault

Secure Credential Access for AI Agents

An open-source credential broker project by Infisical that sits between your agents and the APIs they call.
Agent Vault eliminates credential exfiltration risk - just brokered access out of the box.

Documentation | Installation | CLI Reference | Slack

Why Agent Vault

Traditional secret managers return credentials directly to the caller. This breaks down with AI agents, which are non-deterministic and vulnerable to prompt injection. An attacker can craft a malicious prompt and exfiltrate credentials from the agent.

  • Brokered access, not retrieval - Agents route requests through a proxy. There is nothing to leak because agents never have credentials. Learn more
  • Self-onboarding - Paste an invite prompt into any agent's chat and it connects itself. No env setup, no config files. Works with Claude Code, Cursor, and any HTTP-capable agent.
  • Agent-led access - The agent discovers what it needs at runtime and raises a proposal. You review and approve in your browser with one click.
  • Encrypted at rest - Credentials are encrypted with AES-256-GCM using an Argon2id-derived key. The master password never touches disk. Learn more
  • Multi-user, multi-vault - Role-based access control with instance-level and vault-level permissions. Invite teammates, scope agents to specific vaults, and audit everything.

Agent Vault architecture diagram

Installation

See the installation guide for full details.

Script (macOS / Linux)

Auto-detects your OS and architecture, downloads the latest release, and installs. Works for both fresh installs and upgrades (backs up your database before upgrading).

curl -fsSL https://raw.githubusercontent.com/Infisical/agent-vault/main/install.sh | sh

Supports macOS (Intel + Apple Silicon) and Linux (x86_64 + ARM64).

docker run -it -p 14321:14321 -v agent-vault-data:/data infisical/agent-vault

From source

Requires Go 1.25+ and Node.js 22+.

git clone https://github.com/Infisical/agent-vault.git
cd agent-vault
make build
sudo mv agent-vault /usr/local/bin/

Quickstart

# Start the server (runs on localhost:14321 by default; use --host and --port to change)
agent-vault server -d

# Run with your agent
agent-vault vault run -- claude    # Claude Code
agent-vault vault run -- agent     # Cursor
agent-vault vault run -- codex     # Codex

# Or create an invite for any agent
agent-vault vault agent invite create

Any command that needs authentication will walk you through setup automatically — just run it and follow the prompts. agent-vault vault run wraps your agent process with a scoped session — no tokens to manage. Alternatively, agent-vault vault agent invite create prints an invite prompt you can paste into any agent's chat to connect it.

Once connected, ask the agent to call any external API. It will discover available services, propose access for anything missing, and give you a browser link to approve.

Development

make build      # Build frontend + Go binary
make test       # Run tests
make web-dev    # Vite dev server with hot reload (port 5173)
make dev        # Go + Vite dev servers with hot reload
make docker     # Build Docker image

Beta software. Agent Vault is under active development and may have breaking changes. Use at your own risk. Please review the security documentation before deploying.

About

A credential management proxy and vault for AI agents

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors