Account Secrets Management
Securely manage API keys, tokens, and other sensitive configuration data at the account level
Overview
Account-level secrets provide a secure way to manage sensitive configuration data such as API keys, tokens, passwords, and other credentials that your AI agents need across multiple Devboxes. Secrets are encrypted at rest and automatically made available as environment variables in your Devboxes.
Key Features
- Encrypted at Rest: All secret values are encrypted using industry-standard encryption
- Global Availability: Secrets are accessible across all Devboxes in your account
- Environment Variables: Secrets are automatically injected as environment variables
- Secure Access: Secret values are never exposed in logs or API responses after creation
Creating Secrets
Create a new secret with a globally unique name and value. The secret will be encrypted and made available as an environment variable in all your Devboxes.
Secret Naming Requirements
- Must be a valid environment variable name
- Alphanumeric characters and underscores only
- Globally unique across your account
- Examples:
API_KEY
,DATABASE_URL
,JWT_SECRET
Listing Secrets
Retrieve all secrets in your account. For security reasons, secret values are not included in the response.
Updating Secrets
Update the value of an existing secret. The new value will be encrypted and replace the previous value.
Deleting Secrets
Delete a secret permanently. This action is irreversible and will remove the secret from all Devboxes.
Deleting a secret is permanent and cannot be undone. Any Devboxes relying on this secret will no longer have access to it.
Best Practices
Security Guidelines
-
Use descriptive names: Choose clear, meaningful names for your secrets
- ✅
STRIPE_SECRET_KEY
- ❌
SECRET1
- ✅
-
Follow naming conventions: Use uppercase with underscores for consistency
- ✅
DATABASE_URL
- ❌
databaseUrl
- ✅
-
Rotate secrets regularly: Update secret values periodically for enhanced security
-
Limit secret scope: Only store what’s necessary for your AI workflows
Operational Best Practices
- Document your secrets: Keep track of what each secret is used for
- Monitor secret usage: Regularly review which secrets are still needed
- Test after updates: Verify your Devboxes work correctly after updating secrets
- Clean up unused secrets: Delete secrets that are no longer needed
Common Use Cases
-
API Keys: Third-party service authentication
-
Database Credentials: Connection strings and passwords
-
Service Configuration: Application-specific settings