ADocumentation Index
Fetch the complete documentation index at: https://agent-vault-roles-unified-instance-tier.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Vault is a secure logical container for credentials with services that define how agents can proxy requests through it.
Each vault contains:
- Credentials: API keys, database credentials, and other sensitive material that cannot be extracted from the vault.
- Services: Definitions of which hosts (e.g.
api.stripe.com) can be accessed through the vault along with which and how credential(s) must be attached onto each proxy request. - Members: Users and agents that can access the vault under specific roles (
admin,member,proxy). - Proposals: Requests from agents to set credential(s) and/or add service(s) that use those credentials.
Create a vault
Bind a project to a vault
Runvault init inside your project directory to create an agent-vault.json file that binds the project to a specific vault:
--vault flags or per-user context.
Vault resolution priority: --vault flag > AGENT_VAULT_VAULT env var > agent-vault.json > user context > "default".
Invite agents to a vault
- Agent invite
For any agent you can paste a prompt into (cloud-hosted, chat-based, CI pipelines, or always-on assistants).
Invite users to a vault
Send the invite
Invitee accepts
The invitee clicks the link and lands on a browser acceptance page.
- New users set their password on acceptance and their account is created automatically.
- Existing users get the vault grant applied immediately.
Manage members and agents
Vault scope (who can touch this vault) is managed here. Effective power inside the vault comes from each actor’s instance role — see Permissions. To change someone’s role, useagent-vault owner user set-role or agent-vault agent set-role instead.
Delete a vault
Vault admins can delete the vaults they manage. Instance owners can also delete any vault.--yes to skip the confirmation prompt.