The core problem
In the LLM era, generated or prompt-injected code often runs with direct filesystem and process access. If API keys live in environment variables,.env files, or readable config — any compromised code can exfiltrate them in one line:
How aivault helps
- Secrets are encrypted at rest — XChaCha20-Poly1305 AEAD, never stored or returned in plaintext
- Secrets are pinned to providers —
OPENAI_API_KEYcan only reachapi.openai.com - Auth is broker-owned — callers invoke capabilities, never see or inject auth
- Everything is audited — append-only log of every secret operation and invocation
Pages in this section
- Threat model — what aivault protects against and what it doesn’t
- Encryption — XChaCha20-Poly1305, key hierarchy, and associated data
- Audit log — append-only event log for compliance and forensics