iiRecord
Agentic AI Atlas · Secrets
extension-interface:secretsa5c.ai
II.
ExtensionInterface JSON

extension-interface:secrets

Structured · live

Secrets json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · extensions/extension-interfaces/secrets.yamlCluster · extensions
Record JSON
{
  "id": "extension-interface:secrets",
  "_kind": "ExtensionInterface",
  "_file": "extensions/extension-interfaces/secrets.yaml",
  "_cluster": "extensions",
  "attributes": {
    "interfaceVersion": "1.0.0",
    "description": "Secrets",
    "displayName": "Secrets",
    "concern": "How secrets are sourced, redacted, and scoped within an agent run.",
    "surface": "`resolve(name, scope)` returns a secret reference; `redact(text)`\nremoves known secret values from outgoing text. Implementations\nintegrate with vaults (1Password, Vault, KMS) or env-based stores.\n",
    "builtInDefault": "Reads `process.env` directly with no redaction. Plaintext only.\n",
    "notableImpls": []
  },
  "outgoingEdges": [],
  "incomingEdges": [
    {
      "from": "skill:security-review",
      "to": "extension-interface:secrets",
      "kind": "implements",
      "attributes": {}
    }
  ]
}