The gap
Here’s the typical flow with a traditional secrets manager:- Agent starts up and fetches an API key from the vault
- The key is now in the agent’s memory
- The agent makes requests using that key directly
- The vault is out of the picture
What the Agent Vault does differently
OneCLI’s Agent Vault sits between the agent and the services it calls. Your credentials still live wherever you keep them today (in OneCLI’s encrypted store, in Bitwarden, wherever). But instead of handing the raw key to the agent, the vault proxies the request:- Agent makes a normal HTTP request through the gateway
- The gateway matches the request by host and path
- Credentials are decrypted, injected into the request headers
- The request is forwarded to the target service
- The response passes back to the agent
Deterministic safety, not prompt-based hope
There’s a deeper problem with giving agents direct access to credentials. Even if the agent itself isn’t compromised, it’s still a language model, non-deterministic by nature. You can write “never delete emails without my approval” in your system prompt, but that’s a suggestion the model interprets, not a rule it’s bound by. The agent might misinterpret the instruction. It might be too eager to help and take an action it thought you wanted. It might get manipulated through prompt injection into doing something it was told not to. OneCLI’s Agent Vault moves the security boundary out of the agent’s context and into a layer the agent can’t reach. Rules are enforced at the gateway: deterministically, on every request, regardless of what the agent was told or tricked into doing. A rate limit of 3 deletions per hour isn’t something an agent can talk its way around. A blocked endpoint is blocked, period. This is the fundamental difference between prompt-based safety (“please don’t do that”) and infrastructure-level enforcement (“you can’t do that”). One depends on the model behaving as expected. The other doesn’t.Policies, not just proxying
If all the Agent Vault did was swap keys, it would be useful but limited. The real value is the policy layer on top. You can set rules that control what agents are allowed to do with the services they have access to:- Block specific operations entirely (e.g., no DELETE requests to your email API)
- Rate limit sensitive operations (e.g., max 3 email deletions per hour)
- Scope rules to specific agents or apply them globally
Comparison
| Capability | Traditional secrets manager | OneCLI Agent Vault |
|---|---|---|
| Encrypted storage at rest | Yes | Yes |
| Agent never holds raw keys | No | Yes |
| Per-request credential injection | No | Yes |
| Block specific operations | No | Yes |
| Rate limiting per agent | No | Yes |
| Audit log of every request | No | Yes |
| Works with existing credential sources | N/A | Yes (Bitwarden, more coming) |