nanofleet-vault
A secret manager for NanoFleet agents. Store API keys and credentials in the vault and agents retrieve them at runtime via MCP — secrets never appear in agent prompts or logs.
Install
Go to Plugins in the dashboard. On the Official tab, click Install next to nanofleet-vault — or on the Installed tab click + Install Plugin and enter:
https://raw.githubusercontent.com/NanoFleet/nanofleet-vault/main/manifest.json
A VAULT_ENCRYPTION_KEY is automatically generated at install time. Secrets are stored encrypted at rest.
Managing secrets
After installing, go to Settings → API Keys in the dashboard to add, view, and delete secrets.
Secrets are scoped per agent — you control which agents can access which secrets.
MCP tool
get_secret
Retrieves a secret by name.
get_secret(name: string) → { name: string, value: string }
Example agent usage:
I need to call the GitHub API. Let me retrieve the token first.
→ get_secret("GITHUB_TOKEN")
→ { name: "GITHUB_TOKEN", value: "ghp_..." }
Now I'll use this token to authenticate.
Critical rules for agents
Agents using nanofleet-vault must follow these rules:
- Never log or display secret values — do not echo the value in responses or tool calls.
- Only call
get_secretwhen the secret is needed — do not pre-fetch secrets speculatively. - Use secrets immediately — do not store them in MEMORY.md or any file.
API Keys and requiredEnvVars
Secrets listed in an agent pack’s requiredEnvVars are validated against the API Keys stored in Settings → API Keys at deploy time. If a required key is missing, deployment fails with an error asking you to configure it first.