# agents.txt — Keystore # https://keystore.io/agents.txt Agent: Keystore Description: A credential vault and proxy for AI agents. Store your own API keys or purchase pre-provisioned ones from the marketplace. Your agents get scoped access tokens — never real secrets. Logo: https://keystore.io/icon.svg Communication-Protocol: HTTP Payment-System: Stripe # SDK Integration # Install: npm install @keystore/sdk # Docs: https://keystore.io/docs # Examples: https://keystore.io/examples # How agents use Keystore: # # 1. interceptAll() — patches globalThis.fetch to route all provider # requests through the vault. One line, every SDK works. # # 2. wrap(client) — rewrites a single SDK client's baseURL to the vault. # Targeted proxying with no global side effects. # # 3. setupEnv(providers) — rewrites env vars (OPENAI_BASE_URL, etc.) # so frameworks like LangChain resolve keys from the vault automatically. # # 4. OpenClaw — paste vault URLs and a ks_ token into any system prompt. # No SDK required. Works in any language, any framework. # Vault URLs (use with ks_ agent token as Bearer auth): # OpenAI: https://vault.keystore.com/v1/openai # Anthropic: https://vault.keystore.com/v1/anthropic # Neon: https://vault.keystore.com/v1/neon # Resend: https://vault.keystore.com/v1/resend # S3: https://vault.keystore.com/v1/s3 # Vercel: https://vault.keystore.com/v1/vercel # Providers: 104+ supported. OpenAI, Anthropic, Neon, Resend, S3, Vercel, # Twilio, Pinecone, Groq, Replicate, fal.ai, and more. # Marketplace: Buy pre-provisioned keys. Set up billing once. # BYOK: Store your own keys, encrypted AES-256-GCM at rest. # Security: # - Agent tokens use ks_ prefix, stored as SHA-256 hashes # - Real credentials decrypted only at request time (AES-256-GCM) # - Per-agent budgets, rate limits, and kill switches # - Full audit log of every request # Dashboard: https://dashboard.keystore.io # Signup: https://dashboard.keystore.io/signup # Pricing: https://keystore.io/pricing # Blog: https://keystore.io/blog