Sigil Vault is the just-in-time (JIT) credential broker for the Sigil ecosystem. It ensures that autonomous agents can use external credentials — API keys, cloud secrets, MPC co-signatures — without ever possessing them. Vault is not a secrets manager. It does not store or custody secrets. It is a deterministic capability broker: it intercepts agent requests, validates a cryptographic Intent Attestation from Sigil Sign, fetches a short-lived credential from your own infrastructure at request time, injects it into the outbound request, and purges it from memory. Doctrine: Agents never possess credentials. Vault never stores them. Every capability release requires cryptographic proof of authorization.Documentation Index
Fetch the complete documentation index at: https://docs.sigilcore.com/llms.txt
Use this file to discover all available pages before exploring further.
The Enterprise Fragmentation Problem
Most enterprises operate with decades of accumulated systems: on-premises databases, cloud infrastructure that was lifted-and-shifted without modernization, and a long tail of SaaS tools — each with its own credential model. Autonomous agents cannot tap into these systems in a unified way without a credential injection layer that bridges the gap between the agent’s reasoning context and the access controls each system requires. Vault solves this structurally:- Agents never receive standing credentials — no agent holds a long-lived API key or cloud secret. Every request is gated by a cryptographic Intent Attestation before any credential is released.
- Any credential backend, one integration — Vault abstracts across HashiCorp Vault, AWS Secrets Manager, AWS STS, Azure Key Vault, GCP Secret Manager, and environment variables. Your agents call one proxy; Vault handles the fragmented backend.
- Legacy systems gain agent-safe access — systems that were never designed for autonomous AI access (internal databases, enterprise SaaS, healthcare platforms, financial APIs) can be safely surfaced to agents through Vault’s attestation-gated injection model.
- No organizational change required — agents route through Vault’s local proxy. Your existing credential infrastructure stays in place. No migration, no re-architecture.
How It Works
Vault operates as a localhost MITM TLS proxy that sits between your agent and external services:- Agent sends request — the agent makes a normal HTTPS call through Vault’s proxy (
127.0.0.1:10255), attaching its Intent Attestation from Sigil Sign. - Attestation gate — Vault validates the Ed25519 JWT signature, claims, expiry, and JTI (replay prevention). Invalid or missing attestations are hard-rejected. No fail-open path exists.
- Credential fetch — Vault requests a short-lived, scoped credential from your backend (HashiCorp Vault, AWS Secrets Manager, AWS STS, Azure Key Vault, GCP Secret Manager).
- Injection and forwarding — Vault injects the real credential into the outbound request, strips the attestation header, and forwards via real TLS to the upstream service.
- Audit and purge — the credential is zeroed from memory. The event is appended to a hash-chained audit log linking Intent Attestation to capability release to execution outcome.
Supported Backends
Vault fetches credentials on-demand from client-owned infrastructure:| Backend | Kind | Credential type |
|---|---|---|
| HashiCorp Vault | hashicorp-vault | Dynamic secrets, KV, PKI |
| AWS Secrets Manager | aws-secrets-manager | Stored secrets |
| AWS STS | aws-sts | Temporary session credentials |
| Azure Key Vault | azure-key-vault | Secrets, keys, certificates |
| GCP Secret Manager | gcp-secret-manager | Secret versions |
| Environment variables | env | Static values (dev/test only) |
How It Relates to the Stack
Vault extends Sigil Sign’s authorization model from on-chain execution to off-chain credential access. The flow is:Getting Started
Sigil Vault is in active development. The architecture is finalized and implementation is underway. The steps below describe the MVP operator workflow.
Step 1: Install Vault
Step 2: Initialize and add a trust anchor
kid and fingerprint from your Sigil Sign instance’s GET /.well-known/jwks.json endpoint.
Step 3: Register an agent
Proxy-Authorization header to authenticate with Vault’s proxy.
Step 4: Add a credential backend
Step 5: Create a route
Routes bind an agent to a host pattern and a credential backend:api.openai.com/v1/*, Vault intercepts it, validates the attestation, fetches the credential from hashi-prod, and injects it.
Step 6: Point your agent at the proxy
X-Sigil-Attestation header containing a valid JWT from Sigil Sign.
Step 7: Verify the audit trail
Security Model
- Zero fail-open paths — missing, invalid, expired, or replayed attestations are hard-rejected (403). Unknown or revoked agent tokens are rejected. Backend timeouts return 504, never a blind passthrough.
- No standing privileges — credentials are fetched on-demand and zeroed from memory after injection. No credential persists in Vault between requests.
- Hash-chained audit log — append-only JSONL linking Intent Attestation to capability release to execution outcome. Cryptographically verifiable chain integrity via
sigil-vault audit verify. - 5-second hard cap — the entire request lifecycle (auth, attestation validation, credential fetch, injection, forwarding) must complete within 5 seconds.