Secrets icon

Pricing

Secrets are the vault surface for API keys, credentials, tokens, and private runtime configuration.

Secret vault pricing in Compute Tokens
Secret vault
No standalone CT / live minute runtime rate

Secret vaults are used by connected ACP resources.

Connected compute
Normal resource usage applies

Apps, functions, computers, auth modules, and runtimes keep their own pricing model.

Secret operations
Driven by connected resources

Reads are typically performed by the bound resource at runtime.

SDK functionality

The JavaScript and Python SDKs expose secret vault lifecycle, secret CRUD, bindings, analytics/log inspection where available, and file/runtime inspection through the same resource model.

SDK functionality
LifecycleCreate, list, get, update, and delete secret vault resources from JavaScript or Python.
Secret valuesList, create, read, update, and delete named secret values through client.secrets or the generic resources manager.
BindingsConnect vaults to web apps, functions, auth modules, databases, and agent runtimes that need runtime-only access.
Runtime helpersUse computer-agents/runtime/server inside deployed Node functions and server-side web apps to read bound secrets safely.
OperationsReview which resources can read each vault and rotate values without committing credentials into source files.
Create a secret vault and add a value
Loading...

How to set it up

Start from the workflow that fits the team: create a vault from the SDK, manage it in Develop, or let an agent request the vault and wait for a human to add values.

Via SDK: create the vault, add or rotate secrets, then bind the vault to the workload that needs it.
On the platform: open Develop, create a Secret resource, add values, and connect it to apps or functions.
By agent: ask an agent to identify required secrets and prepare bindings, while a human supplies sensitive values.

How to manage

Treat secrets as production infrastructure. Rotate values intentionally, review bindings before deploys, and keep the purpose of every secret clear.

How to manage
BindingsReview which web apps, functions, auth modules, databases, and runtimes can read a vault.
RotationUpdate secret values centrally and redeploy or restart connected resources when the downstream provider requires it.
Runtime accessRead secrets from server-side runtime helpers so values never enter browser bundles, task prompts, or source control.