Feature: Secret Injection — Inject credentials into API calls without agent access #91
Labels
No labels
Compat/Breaking
Kind/Bug
Kind/Competitor
Kind/Documentation
Kind/Enhancement
Kind/Epic
Kind/Feature
Kind/Security
Kind/Story
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Scope/Core
Scope/Cross-Plugin
Scope/Plugin-System
Scope/Single-Plugin
Status
Abandoned
Status
Blocked
Status
Need More Info
No milestone
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
ultanio/cobot#91
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Motivation
Currently, Cobot agents receive their API keys via environment variables or avault — in both cases the agent has secrets in plaintext. If an agent is compromised (prompt injection, supply chain attack), the keys are exposed.
Both IronClaw (#89) and Sigilum (#90) solve this in different ways:
Proposal
A lightweight credential proxy that fits Cobot's minimal philosophy:
Option A: Local HTTP Proxy
A small HTTP proxy (similar to Sigilum's gateway) that:
localhost:PORT/proxy/openai/v1/chat/completionsAuthorization: Bearer sk-...headerPro: Simple, framework-agnostic, no WASM needed
Con: Agent could theoretically abuse the proxy (rate limiting needed)
Option B: avault + Injection Layer
Extend avault with an injection layer:
Pro: Builds on existing avault, Nostr-native
Con: More complexity in the daemon
Option C: Nostr-based Service Registry
Inspired by Sigilum's DID registry, but with Nostr:
Pro: Decentralized, Nostr-native, no custom DID system needed
Con: Needs custom event kinds, service-side adoption long-term
Additional considerations
Priority
Option A would be fastest to implement and provides immediate value. Option C is the most elegant long-term solution.
References
Feature: Secret Injection — Credentials ohne Agent-Zugriff in API-Calls injizierento Feature: Secret Injection — Inject credentials into API calls without agent accessSecurity/Privacy reviewer: Ben (@webdiverblue) wants to be looped in on any security and privacy findings related to secret management, avault integration, and leak detection. CC alongside @k9ert on all security-relevant updates.