Ask HN: Best practice securing secrets on local machines working with agents?

10 pointsposted 16 days ago
by xinbenlv

Item id: 46719363

6 Comments

bilbo-b-baggins

15 days ago

The solution that Anthropic uses for Claude Code Web for repository access is to not give the LLM any secrets at all - anything requiring escalated privilege is done through a proxy which holds the credentials.

varshith17

15 days ago

Concrete setup: (1) All secrets in 1Password/Bitwarden with CLI, (2) Agent sandbox with no env var access, (3) Wrapper scripts that fetch secrets on-demand and inject at runtime, (4) Context scrubbers that strip secrets before LLM sees logs. Key insight: don't prevent agent access to secrets, prevent secrets from entering agent context/logs. Different problem, solvable with tooling.

CriptoSeguro25

16 days ago

TBH, the best pattern I've seen is just nuking the secrets at the input level. Run a local regex watcher in-memory that flags anything looking like a PK or seed phrase before it even hits the agent's context window. Keeps it off the network stack entirely

nojs

16 days ago

Run the agent in a sandbox without access to production secrets.

deflator

16 days ago

I've been having success using Doppler for secret storage. Takes it off the filesystem.