Build tools and agents on zero-knowledge secrets infrastructure.
The AgentSecrets SDK is the programmatic interface to AgentSecrets infrastructure. It lets you build tools, MCP servers, and AI agents where credential values never enter your code β or the code of anyone using what you build.
from agentsecrets import AgentSecrets
client = AgentSecrets()
response = client.call(
"https://api.stripe.com/v1/balance",
bearer="STRIPE_KEY"
)You pass a key name. The SDK resolves the value from the OS keychain, injects it at the transport layer, and returns only the API response. The value is not in your code. Not as a variable. Not as a return value. Not in any log. Not in the context of any agent using your tool.
Every secrets SDK today works the same way: retrieve the value, hand it to your code.
vault.get("STRIPE_KEY") β sk_live_51H... β now it's in memory
β prompt injection can reach it
β malicious plugin can reach it
β every user of your tool inherits the risk
The AgentSecrets SDK has no get(). No retrieve(). The only operations are: make the call, or spawn the process. In both cases, the value resolves inside the proxy and never crosses into application code.
client.call(bearer="STRIPE_KEY") β proxy resolves from OS keychain
β injects into outbound HTTP request
β returns API response only
β value never entered your code
This is the shift: instead of your code retrieving credentials and using them, your code references credentials by name and the infrastructure handles everything else. The zero-knowledge guarantee is not a policy, it is structural β the value has nowhere to go except into the request.
The multiplier: When you build a tool on the AgentSecrets SDK and publish it, every user of that tool gets zero-knowledge credential management automatically. They do not need to understand the architecture. They do not need to configure anything beyond setting up AgentSecrets once. The infrastructure guarantee extends from your code to theirs without them knowing it is there.
That is what it means to build on infrastructure rather than implement a pattern.
MCP servers with no credential storage An MCP server built on the SDK has no credential values in any config file, environment variable, or agent context. Users install it, set their secrets in AgentSecrets once, and every tool in the server works. The credentials never leave the OS keychain.
Agent framework integrations LangChain tools, CrewAI tools, AutoGen function tools β any agent framework integration built on the SDK gives the agent full API access with zero credential exposure. The agent calls the tool. The tool calls the SDK. The SDK calls the proxy. The agent never held anything.
Multi-tenant developer tools The scoped workspace context lets a single tool operate across multiple workspaces β multiple clients, multiple credential sets β without global state changes and without the tool ever holding credential values. Each workspace is isolated. Each call is audited.
CI/CD and deployment pipelines (Coming soon) Service tokens will let automated environments authenticate to AgentSecrets without an interactive session or OS keychain. One token, set as an environment variable, replaces every credential that would otherwise live in pipeline configuration files.
Autonomous agent workflows The management layer gives agents full programmatic control of the credentials lifecycle β checking drift, syncing from cloud, switching workspaces, reading audit logs β all without ever accessing a credential value. The agent operates the infrastructure. It never sees what the infrastructure holds.
The SDK sits in front of the AgentSecrets proxy. The proxy sits in front of every API call.
Your code AgentSecrets Target API
ββββββββββ ββββββββββββ ββββββββββ
client.call() β proxy receives request
resolves key from
OS keychain β injects credential
into HTTP request
returns API response β API responds
β response
(no credential value)
Authentication is resolved from the environment β no credentials are passed into the SDK:
-
Local proxy running β SDK connects to
localhost:8765, inherits the session fromagentsecrets login. This is the path for local development, MCP servers, and persistent servers. -
Cloud Resolver (Coming soon) β SDK authenticates directly to the AgentSecrets cloud using a service token (
AGENTSECRETS_TOKEN). This will be the path for CI/CD pipelines, Docker containers, and automated environments. -
No active session β SDK raises
AgentSecretsNotRunningwith actionable instructions.
The SDK never accepts a username, password, or API key as a parameter. Authentication happens outside the SDK, in the environment. This is intentional β if the SDK accepted credentials as parameters, developers would eventually hardcode them, which is the exact problem this infrastructure exists to solve.
The SDK ships in two layers. Each serves a distinct use case.
Layer 1 β The Call Layer
Make authenticated API calls and spawn credential-injected processes. This is what 90% of tools need. One client, two methods: call() and spawn(). Import the SDK, make the call, the zero-knowledge guarantee is in place.
Layer 2 β The Management Layer Full programmatic control of the AgentSecrets lifecycle. Workspace and project management, secrets operations, drift detection, audit log access. This is what AI agents need to operate the credentials infrastructure autonomously.
| Language | Package | Docs | Status |
|---|---|---|---|
| Python | pip install agentsecrets |
python/README.md | π¨ In development |
| Go | go get github.com/The-17/agentsecrets-sdk/go |
go/README.md | π Planned |
| JavaScript | npm install @the-17/agentsecrets-sdk |
javascript/README.md | π Planned |
Each language has its own README with full installation, usage, and API reference for that ecosystem. The infrastructure guarantees are identical across all three.
agentsecrets-sdk/
βββ README.md This file
βββ python/ Python SDK
β βββ README.md
β βββ agentsecrets/
βββ go/ Go SDK (planned)
β βββ README.md
βββ javascript/ JavaScript SDK (planned)
βββ README.md
These projects are built on the SDK. Each one is proof of the infrastructure claim.
| Project | What it does | Status |
|---|---|---|
| Zeroknowledge MCP | Template for building MCP servers with zero credential storage | Completed |
| agentsecrets-langchain | Zero-knowledge API calls in any LangChain agent | Coming soon |
Building something on the SDK? Open a PR to add it here.
Prerequisites: AgentSecrets CLI installed and running.
# Install the CLI
brew install The-17/tap/agentsecrets # macOS / Linux
npm install -g @the-17/agentsecrets # all platforms
pip install agentsecrets-cli
# Set up
agentsecrets init
agentsecrets secrets set STRIPE_KEY=sk_live_...
agentsecrets workspace allowlist add api.stripe.com
agentsecrets proxy startThen install the SDK for your language and make your first call. See the language-specific README for the full guide.
Found a bug? Open an issue Have an idea? Start a discussion
See CONTRIBUTING.md for development setup.
- AgentSecrets CLI: github.com/The-17/agentsecrets
- ClawHub: clawhub.ai/SteppaCodes/agentsecrets
- Security: hello@theseventeen.co β response within 24 hours
MIT License β Built by The Seventeen
The agent operates it. The agent never sees it.