SEKSBot
Secure secret management for AI agents and shells
What is SEKSBot?
๐ seksh
A nushell fork with broker integration. Use API keys and credentials without exposing them to your shell session.
๐ SEKS Broker
Cloud-native secret management. Agents authenticate with tokens; the broker injects real credentials at runtime.
๐ก๏ธ Zero Knowledge
Secrets never touch agent memory. Output scrubbing catches accidental leaks. Audit logging tracks every access.
The Problem
AI agents need API keys to be useful. But giving an agent your credentials means:
- Secrets in shell history and logs
- Tokens visible in process memory
- Credentials leaked via prompt injection
- No audit trail of secret usage
SEKSBot solves this. Agents request capabilities by name. The broker handles the actual secrets.
Getting Started
Early Access: SEKSBot is in active development. The broker is live; seksh is buildable from source.
# Clone seksh (nushell fork with broker integration)
git clone https://github.com/SEKSBot/seksh
cd seksh && git checkout seks-shell
cargo build --release
# Configure broker connection
export SEKS_BROKER_URL="https://seks-broker.example.com"
export SEKS_AGENT_TOKEN="seks_agent_..."
# Use secrets without seeing them
./target/release/nu -c "listseks" Stay Updated
Follow our blog for updates, or send us feedback to shape the project.