Scan + try the proxy
Active key protectionfor the age of AI agents.
VaultProof splits, encrypts, and proxies your API keys so apps, agents, and MCP tools never handle the raw provider secret.
VS THE FIELD
One column of dots, for a reason.
VaultProof is for teams that need API keys to be usable without being handed directly to apps, build logs, agents, or context windows.
04 / PRICING
Scan is free. Proxy is metered.
Side projects
Small teams
Custom SLA & audit
SECURITY
Auditable so your security team does not have to guess.
The security model is documented in public: where keys exist, what is stored, what is logged, and what VaultProof deliberately does not protect against.
Threat model
Explicit assumptions, exclusions, and breach scenarios for security teams.
Audit trail
Per-call metadata for investigations without logging raw provider keys.
Agent auth
Agents receive scoped proxy credentials and normal provider-compatible URLs.
Open components
The CLI and split-key flow can be inspected, tested, and run locally.
FAQ
What teams ask before switching.
Short answers first. The longer versions live in the docs and security architecture pages.
What if VaultProof goes down?
Your fallback depends on your chosen deployment and policy. Enterprise deployments can use dedicated runtime options, and teams can define operational procedures for break-glass access. The public docs cover the proxy and runtime model.
Can VaultProof itself read my key?
VaultProof is designed so raw keys are not stored whole at rest. During proxy use, the key is assembled briefly in memory to call the upstream provider, then cleared. The security page documents that boundary directly.
How is this different from Vault or Doppler?
Traditional secret managers protect values at rest and then hand the full secret to the app. VaultProof focuses on keeping the raw provider key out of the app and agent context by using a proxy URL and split shares.
Does it work with Claude Code, Cursor, or Codex?
Yes. The agent gets a proxy credential and provider-compatible base URL. It can call the model while the real provider key stays out of prompts, logs, and local environment files.
What is the latency overhead?
There is an extra proxy hop. The practical impact depends on provider, region, and workload. For LLM calls, the model response usually dominates total request time, and VaultProof supports streaming responses.
HOW IT WORKS
Split before storage. Reconstruct only to call.
The workflow is intentionally boring: scan env files, split keys, rewrite config, route calls through a provider-compatible proxy.
You split.
The CLI finds API keys and creates separate shares before the whole secret is uploaded anywhere.
We store one encrypted share.
The stored share is policy controlled and mathematically insufficient on its own.
The proxy calls upstream.
The key is assembled for the request, sent to the provider, then removed from memory.
WORKS WITH
250 provider signatures · custom APIs · NetOps env secrets
Start with the built-in provider catalog, or define a custom HTTP provider for internal services.
FOR AI AGENTS
Your agent gets a proxy URL. Never the key.
Hand Claude, Codex, Cursor, or an MCP server a VaultProof project token and provider-compatible base URL. The agent does its work without seeing the raw sk- value.
# Agent prompt # Use this proxy URL. Do not log secrets. OPENAI_API_KEY=vp-proj_7b3a9f1c8e OPENAI_BASE_URL=https://proxy.vaultproof.dev/v1 # Agent makes a normal provider call. curl https://proxy.vaultproof.dev/v1/chat/completions \ -H "Authorization: Bearer $OPENAI_API_KEY" \ -d '{"model":"gpt-4o","messages":[...]}'