Security Secrets
Encrypted storage for sensitive monitor credentials
Internal Vault Empty
Encrypt credentials like API tokens, private keys, and authorization headers.
Security Architecture
AES-256 GCM Encryption
All secrets are encrypted at the edge before being persisted to the secure vault. Only the monitor execution engine can decrypt them during active runs.
Zero-Trust Environment
Once created, secrets can never be viewed in plain text within the UI. They are referenced using placeholder IDs to maintain maximum project security.