Product Docs SDK CLI Pricing Security Status Get a key

Active key protectionfor the age of AI agents.

VaultProof splits, encrypts, and proxies your API keys so apps, agents, and MCP tools never handle the raw provider secret.

Get started - it is free
Share 1 - browser
9c bd ba aa
d8c98617
0f449b...
Held only by your session.
Your API key
sk-proj-736b2d70726f6a5f...
Proxy assembles for the call, then clears it.
Share 2 - vault
a9 c6 f7 e4
15c2232d
encrypted...
Stored encrypted and policy gated.
Share 1 alone
useless.
It cannot call a provider or reconstruct a secret by itself.
Share 2 alone
useless.
It is insufficient without the caller share and an allowed proxy request.
Shamir (2,2) over GF(256) - client-side split
Built for teams using
OpenAI
Anthropic
Google AI
Notion
Runway
Vercel
Arc
99.9%
proxy uptime target
2
shares required
SSE
streaming ready
0
plaintext keys at rest

VS THE FIELD

One column of dots, for a reason.

VaultProof is for teams that need API keys to be usable without being handed directly to apps, build logs, agents, or context windows.

Capability
VaultProof
Doppler
HCP Vault
1Password
Key never sits whole in app config
--
--
--
Split-key storage before upload
--
--
--
Proxy URL for AI agents
--
--
--
MCP authentication route
--
--
--
Per-call audit log
--
Dedicated enterprise runtime
Enterprise
--
Available
--

04 / PRICING

Scan is free. Proxy is metered.

free
$0/mo

Scan + try the proxy

calls/mo10,000
key slots3
audit log7d
get started
starter
$5/mo

Side projects

calls/mo50,000
key slots10
audit log30d
get started
enterprise
talk

Custom SLA & audit

calls/mo
key slots1,000
audit logcustom
contact us ->

SECURITY

Auditable so your security team does not have to guess.

The security model is documented in public: where keys exist, what is stored, what is logged, and what VaultProof deliberately does not protect against.

TM

Threat model

Explicit assumptions, exclusions, and breach scenarios for security teams.

LOG

Audit trail

Per-call metadata for investigations without logging raw provider keys.

MCP

Agent auth

Agents receive scoped proxy credentials and normal provider-compatible URLs.

OSS

Open components

The CLI and split-key flow can be inspected, tested, and run locally.

FAQ

What teams ask before switching.

Short answers first. The longer versions live in the docs and security architecture pages.

What if VaultProof goes down?

Your fallback depends on your chosen deployment and policy. Enterprise deployments can use dedicated runtime options, and teams can define operational procedures for break-glass access. The public docs cover the proxy and runtime model.

Can VaultProof itself read my key?

VaultProof is designed so raw keys are not stored whole at rest. During proxy use, the key is assembled briefly in memory to call the upstream provider, then cleared. The security page documents that boundary directly.

How is this different from Vault or Doppler?

Traditional secret managers protect values at rest and then hand the full secret to the app. VaultProof focuses on keeping the raw provider key out of the app and agent context by using a proxy URL and split shares.

Does it work with Claude Code, Cursor, or Codex?

Yes. The agent gets a proxy credential and provider-compatible base URL. It can call the model while the real provider key stays out of prompts, logs, and local environment files.

What is the latency overhead?

There is an extra proxy hop. The practical impact depends on provider, region, and workload. For LLM calls, the model response usually dominates total request time, and VaultProof supports streaming responses.

HOW IT WORKS

Split before storage. Reconstruct only to call.

The workflow is intentionally boring: scan env files, split keys, rewrite config, route calls through a provider-compatible proxy.

STEP 01

You split.

The CLI finds API keys and creates separate shares before the whole secret is uploaded anywhere.

STEP 02

We store one encrypted share.

The stored share is policy controlled and mathematically insufficient on its own.

STEP 03

The proxy calls upstream.

The key is assembled for the request, sent to the provider, then removed from memory.

WORKS WITH

250 provider signatures · custom APIs · NetOps env secrets

Start with the built-in provider catalog, or define a custom HTTP provider for internal services.

OpenAI
Anthropic
Google AI
Mistral
Cohere
Groq
Perplexity
DeepSeek
Fireworks
Together
Replicate
Custom

FOR AI AGENTS

Your agent gets a proxy URL. Never the key.

Hand Claude, Codex, Cursor, or an MCP server a VaultProof project token and provider-compatible base URL. The agent does its work without seeing the raw sk- value.

agent.env
# Agent prompt
# Use this proxy URL. Do not log secrets.
OPENAI_API_KEY=vp-proj_7b3a9f1c8e
OPENAI_BASE_URL=https://proxy.vaultproof.dev/v1

# Agent makes a normal provider call.
curl https://proxy.vaultproof.dev/v1/chat/completions \
  -H "Authorization: Bearer $OPENAI_API_KEY" \
  -d '{"model":"gpt-4o","messages":[...]}'