keychains.dev: The "Key Butler" for AI Agents—Keep Your Secrets Out of Reach
2026-02-21 | Official Site | Product Hunt | Hacker News

Screenshot Breakdown: The keychains.dev homepage is very direct—on the left, the bold text reads "Give your agent the keys. Not the kingdom." On the right is a terminal demo: replacing
curlwithnpx -y keychains curland swapping hardcoded keys for template variables like{{GITHUB_TOKEN}}. At the bottom, three numbers: 11K+ API providers, 0 keys exposed, 3 steps to get started. The positioning is crystal clear.
30-Second Quick Judgment
What is this?: A credential proxy service. Does your AI Agent need to call an API? You don't have to give it the API Key directly anymore. keychains.dev injects credentials on the server side, so the Agent never sees the real secret.
Is it worth watching?: Worth watching, but with caution. This product launched just yesterday (February 20, 2026), with only 2 votes on PH. However, it hits a real and urgent pain point—early 2026 has seen a surge in AI Agent security incidents, 67% of which involve API key leaks. The problem is real, but the product is very early.
Three Questions for You
Is it relevant to me?
Target Audience: Developers building AI Agents using frameworks like OpenClaw, AutoGPT, or LangChain.
Am I the target? You are if any of these apply:
- You're configuring API Keys for an AI Agent and feel uneasy about it.
- Your Agent needs to call multiple third-party APIs (GitHub, Slack, Notion, etc.), and managing keys is a headache.
- You're worried that Prompt Injection attacks will leak credentials from the Agent's context.
- You're building a multi-agent system and need to assign different permissions to sub-agents.
Use Cases:
- Agent automatically calls GitHub API to manage repos -> Use
keychains curlinstead of passing the Token directly. - Multi-agent collaboration -> The parent Agent issues tokens with limited permissions to sub-agents.
- Enterprise auditing of Agent API calls -> Keychains provides full audit logs.
Is it useful to me?
| Dimension | Benefit | Cost |
|---|---|---|
| Time | No need to build your own key management/proxy layer (someone on HN said, "You're building infrastructure just to hide a string from your own tool") | Learning the Keychains CLI + refactoring existing curl calls |
| Money | Avoid massive losses from leaked keys | Pricing not public; likely SaaS fees |
| Security | Agents never touch real keys; Prompt Injection becomes ineffective | Adds an intermediate proxy layer; one more node to trust |
ROI Judgment: If you're just working on a personal project with two or three APIs, environment variables are enough for now. But if you're building an enterprise-grade multi-agent system or your Agent handles sensitive APIs (payments, email), you'll need a tool like this eventually—the question is whether to choose Keychains or an alternative.
Is it delightful?
The "Aha!" Moments:
- Drop-in curl replacement: Swap
curlforkeychains curl, replace keys with{{template_variables}}, and you're done in three steps. No architectural changes needed. - User Consent Mechanism: When an Agent needs new permissions, a confirmation pops up. Users can approve or deny with one click, much like an OAuth authorization page.
- Sub-agent Permission Isolation: You can give sub-agents "blank tokens"; they have to request specific permissions on the fly when needed.
Real User Feedback:
"I actually tried integrating Notion and Slack, and I was honestly shocked that it worked instantly without writing a single line of JSON schema. Secure tool usage in three lines of code. It's basically 'magic'." — @ai_negi_lab_com (Japanese AI tool curator)
"The security layer alone makes it worth it, no more janky API key management." — @dailyaifind
For Independent Developers
Tech Stack
- CLI: Node.js (installed via npx),
keychains curlcommand-line tool - Auth: SSH key pairs for machine identity (Ed25519), exchanging fingerprints for each machine
- Proxy Layer: Server-side credential injection, template variable replacement
- Supported Protocols: OAuth, API Key, Basic Auth, Custom Headers
- Infrastructure: Cloud-based credential proxy server
Core Implementation
Essentially, it's a "man-in-the-middle": when your Agent sends a request, it doesn't go directly to the API with the key. It goes to the Keychains server, which replaces {{STRIPE_PRIVATE_KEY}} with the real key before forwarding it. The Agent only ever sees the template variable.
On the security side, it uses SSH key pairs for machine authentication—each machine running an Agent has its own key pair. If a key is leaked, it becomes invalid the first time it's used elsewhere.
Open Source Status
- Not open source. No code repository for keychains.dev can be found on GitHub.
- Open-source competitors: Wardgate (available on GitHub), DeepSecure (Apache 2.0).
- Build-it-yourself difficulty: The core proxy injection logic isn't hard (about 1 person-month), but supporting auth adaptation for 6754+ APIs, OAuth refreshing, and audit logs would take at least 3-6 person-months.
Business Model
- Monetization: Not public; expected SaaS subscription (billing by API calls or number of Agents).
- Pricing: Not public (launched February 20, 2026).
- User Base: Too early for public data. The site claims 11K+ API Providers.
Giant Risk
High Risk. This is a sector tech giants are aggressively entering:
- Okta has launched "Auth for GenAI," including Token Vault and Fine-Grained Authorization.
- Auth0 (owned by Okta) has a full AI Agent auth SDK.
- 1Password’s Extended Access Management supports device trust and credential injection.
- HashiCorp Vault’s Boundary already has SSH credential injection features.
Keychains' differentiator is that it isn't an enterprise IAM platform; it's a lightweight CLI tool for individual developers. Giant solutions are too heavy; Keychains' drop-in curl replacement is better suited for indie devs and small teams.
For Product Managers
Pain Point Analysis
- Problem Solved: AI Agents need API access, but giving them keys directly is dangerous—Prompt Injection can steal keys from the context.
- How painful is it?: High frequency and essential. Early 2026 saw massive AI Agent security breaches: ClawdBot exposed 1800+ instances leaking keys, and Moltbook leaked over 1.5 million keys. 67% of AI security incidents involve credential leaks.
User Persona
- Core User: AI developers using OpenClaw/LangChain/AutoGPT.
- Extended User: Enterprise AI teams, product teams needing to configure Agent permissions.
- Use Case: Agents automating calls to third-party APIs (GitHub, Slack, Notion, Stripe, etc.).
Feature Breakdown
| Feature | Type | Description |
|---|---|---|
| keychains curl (CLI Proxy) | Core | Drop-in curl replacement, replaces keys with template variables |
| SSH Machine Auth | Core | Passwordless authentication using SSH key pairs for each machine |
| User Consent Flow | Core | User approval when an Agent requests new permissions |
| Multi-Agent Delegation | Core | Issuing scoped tokens to sub-agents |
| Audit Logs | Core | Full call records for every Agent and task |
| Instant Revocation | Core | Immediately revoke access for any machine |
| Multi-protocol Support | Nice-to-have | Compatible with OAuth, API Key, Basic Auth, and Custom Headers |
Competitor Comparison
| Dimension | keychains.dev | Wardgate | Composio | Aembit |
|---|---|---|---|---|
| Positioning | Lightweight CLI Proxy | Open Source HTTP Proxy | Integration Platform | Enterprise IAM |
| Onboarding | 3 steps | Requires server deployment | SDK Integration | Enterprise POC |
| Open Source | No | Yes | No | No |
| Protocols | All | HTTP/IMAP/SMTP | Primarily OAuth | All |
| Best for | Indie Developers | Tech-savvy individuals | Mid-sized teams | Enterprises |
| Price | Not public | Free | Freemium | Enterprise Quote |
Key Takeaways
- "Replace curl with keychains curl"—A brilliant low-migration-cost design.
- "Blank Token" mechanism—Sub-agents start with zero permissions and request them on the fly; a very clever interaction design.
- SSH key pairs over API Keys—Using short-term keys and machine fingerprints instead of long-term keys is the future of security.
For Tech Bloggers
Founder Story
- Founder: Severin Marcombes (@severin__), a French entrepreneur.
- Background: MIT Innovators Under 35 winner. Founded Lima (shared storage system, raised nearly €1M on Kickstarter in 2013), later created Creative Robots and Layouts.dev (Tailwind UI editor).
- Why build this?: "I built something for myself that quickly turned into a product"—he made a key manager for his own Agent and realized others needed it too.
- Ecosystem: keychains.dev is part of the @interagentic ecosystem.
Discussion Angles
- Angle 1: The Proxy Trust Paradox—You don't trust the Agent, so you use a proxy to isolate keys. But do you trust Keychains' servers? All credentials pass through them—isn't that just shifting the risk?
- Angle 2: The Window Before the Giants—Okta, Auth0, and 1Password are moving fast into AI Agent auth in 2025-2026. How long is the window for independent tools like keychains.dev?
- Angle 3: AI Agent Security as the Biggest 2026 Topic—The ClawdBot leak, the Moltbook 1.5M key leak... the heat in this sector is undeniable.
Hype Data
- PH Rank: 2 votes (very low, likely just launched without promotion).
- HN Show HN: Posted 2 days ago; some discussion but moderate heat.
- Twitter Buzz: ~10-12 tweets, all concentrated on launch day (2026-02-20), mostly positive.
- Sector Heat: Extremely high. Over 5 similar Show HNs have appeared in the last 3 weeks (Wardgate, Pincer-MCP, MCP Secrets Vault, Agent Panopticon, etc.).
Content Suggestions
- Best Angle: "AI Agent key leaks are surging in 2026—these 5 tools are racing to fix it"—a comparison of Keychains, Wardgate, Pincer-MCP, etc.
- Trend Jacking: With the ClawdBot/OpenClaw incidents trending, Keychains' slogan directly mentions "Secure your OpenClaw bot."
For Early Adopters
Pricing Analysis
| Tier | Price | Features | Is it enough? |
|---|---|---|---|
| Free | Unknown | Unknown | Unknown |
| Paid | Unknown | Unknown | Unknown |
To be honest, pricing is completely undisclosed. The product just launched yesterday and is likely in Early Access. Check the official site or contact the founder directly.
Getting Started
- Setup Time: Official claim is 3 steps; realistically 10-15 minutes.
- Learning Curve: Low (assuming you know how to use curl).
- Steps:
- Install:
npx -y keychains curl - Replace credentials: Swap API Keys for
{{TEMPLATE_VAR}} - Configure real credentials in the Keychains dashboard.
- Start using; the Agent no longer touches real keys.
- Install:
Pitfalls and Warnings
- Extremely New: Launched 2026-02-20; stability and reliability are unproven.
- Proxy Latency: All API calls go through Keychains servers, which might add lag (a common concern in HN discussions for similar solutions).
- Server Trust: All your API calls pass through them; you must trust this third party.
- Closed Source: You cannot audit the code yourself if something goes wrong.
Security and Privacy
- Data Storage: Credentials stored on Keychains' servers; Agent side only has SSH keys.
- Privacy Policy: Not yet detailed publicly.
- Security Audit: Provides audit logs, but whether the product itself has undergone a third-party audit is unknown.
Alternatives
| Alternative | Pros | Cons |
|---|---|---|
| Wardgate (Open Source) | Free, open-source, supports IMAP/SMTP, sensitive data filtering | Requires self-hosting |
| Pincer-MCP | Native to MCP protocol, high integration | Limited to MCP ecosystem |
| Env Vars + Proxy | Simplest, zero cost | Worst security; Agent can read them |
| Composio | Most feature-rich, multi-tool integration | Commercial product, limited free tier |
| DeepSecure (Open Source) | Apache 2.0, cryptographic identity | More complex, enterprise-focused |
For Investors
Market Analysis
- Key Management Sector: $4.22B in 2025 -> $8.05B in 2030 (CAGR 13.8%).
- AI Agent Sector: $7.84B in 2025 -> $52.62B in 2030 (CAGR 46.3%).
- Privileged Access Management (PAM): $5.17B in 2026 -> $13.83B in 2031 (CAGR 21.7%).
- Drivers: The ratio of machine identities to human identities in enterprises has reached 45:1; non-human identities account for 68% of total access entities.
Competitive Landscape
| Tier | Players | Positioning |
|---|---|---|
| Top | Okta/Auth0, HashiCorp Vault, 1Password | Enterprise IAM Platforms |
| Mid | Composio, Aembit, Akeyless | AI Agent-specific Auth |
| New Entrants | keychains.dev, Wardgate, Pincer-MCP, DeepSecure | Lightweight/Open Source Tools |
Timing Analysis
- Why Now?: Q1 2026 saw a cluster of AI Agent security breaches (ClawdBot, Moltbook). Developer anxiety regarding key management is at an all-time high. HN saw 5+ similar Show HNs in 3 weeks.
- Tech Maturity: Underlying techs (proxy layers, SSH, OAuth) are mature; the innovation lies in the combination for Agent scenarios.
- Market Readiness: Gartner predicts 40% of enterprise apps will embed AI Agents by 2026 (up from <5% in early 2025), leading to an explosion in credential management needs.
Team Background
- Founder: Severin Marcombes, French, MIT Innovators Under 35.
- Past Projects: Lima (nearly €1M on Kickstarter, shared storage), Layouts.dev (Tailwind editor).
- Core Competencies: Serial entrepreneur with experience across hardware, software, and dev tools.
- Team Size: Unknown; likely a solo project or small team.
Funding Status
- Raised: No public info.
- Sector Benchmarks: Infisical raised $16M (open-source key management); Aembit funding undisclosed but has enterprise clients.
- Valuation: N/A
Conclusion
keychains.dev hits the hottest pain point in AI Agent security, but it is a day-old infant.
The problem it solves is real—AI Agent key leaks are rampant in 2026, and devs need lightweight solutions. However, the challenges are clear: it's closed-source, pricing is unknown, giants are looming, and several competitors appeared on HN in the same week. The timing is perfect, but success will depend entirely on execution.
| User Type | Recommendation |
|---|---|
| Developers | Wait and see. If you need a solution now, try the open-source Wardgate; if you want the simplest drop-in experience, try Keychains. |
| Product Managers | Watch this space. "Credential Proxying" is a must-have for AI Agent infrastructure; study the competitor approaches. |
| Bloggers | Write about it! "AI Agent Key Leaks" is the hot security topic of Q1 2026; comparing these tools will drive traffic. |
| Early Adopters | Hold off. The product is too new; stability is questionable. Wait for pricing and community feedback. |
| Investors | The sector is confirmed, but this specific target is very early. Monitor founder Severin Marcombes' execution and future funding rounds. |
Resource Links
| Resource | Link |
|---|---|
| Official Site | keychains.dev |
| Product Hunt | Keychains.dev |
| Hacker News | Show HN |
| Founder Twitter | @severin__ |
| Founder GitHub | smarcombes |
| Competitor Wardgate | GitHub |
| Competitor DeepSecure | GitHub |
| HN Discussion | How are you managing secrets with AI agents? |
2026-02-21 | Trend-Tracker v7.3