Show HN: Agent Vault – Open-source credential proxy and vault for agents

· coding ai ai-agents · Source ↗

TLDR

  • Infisical’s Agent Vault is an open-source HTTP proxy that injects credentials at the network layer so agents never receive or see secrets.

Key Takeaways

  • Agents get a scoped session and HTTPS_PROXY env var; Agent Vault intercepts outbound HTTPS requests and injects credentials before forwarding upstream.
  • Credentials are encrypted at rest with AES-256-GCM; an optional Argon2id-wrapped DEK means password rotation does not trigger re-encryption of stored secrets.
  • Works with any HTTP-speaking agent process: Claude Code, Cursor, Codex, custom Python/TypeScript agents, or containerized sandboxes via Docker/Daytona/E2B.
  • Container sandbox mode uses iptables-locked egress so a non-cooperative child process physically cannot bypass the proxy, regardless of prompt injection attempts.
  • Request logs capture method, host, path, status, latency, and credential key names but never bodies, headers, or query strings; retention is configurable per vault.

Hacker News Comment Review

  • Commenters identified concrete gaps: OAuth2 token-refresh responses can return new tokens directly to the agent in the payload, bypassing the proxy’s credential-hiding guarantee.
  • There is open skepticism about whether proxy-layer isolation is sufficient if the agent can introspect its own environment or reverse-engineer vault access; the container sandbox with iptables egress is seen as the stronger threat model.
  • Multiple builders noted they had whiteboard designs for exactly this pattern, suggesting unmet demand, and several raised questions about standards for short-lived identity delegation (OAuth tokens vs. long-lived static credentials) as a complementary or successor approach.

Notable Comments

  • @wfinigan: Had an internal design for this exact pattern when Agent Vault dropped; calls out that existing solutions are tied to specific cloud vendors or protocols like MCP.
  • @sandeepkd: Flags that endpoints without credential requirements could still receive injected credentials if the proxy applies them indiscriminately, and that some services can return refreshed tokens in response bodies.
  • @hebetude: “I’ve seen it reverse engineer many things to expose the underlying credentials” – argues firewall-enforced network isolation is the only reliable mitigation.

Original | Discuss on HN