| Crates.io | iron_secrets |
| lib.rs | iron_secrets |
| version | 0.3.0 |
| created_at | 2025-11-29 13:10:47.828049+00 |
| updated_at | 2025-12-16 16:02:03.862201+00 |
| description | Secrets management and encryption for Iron Cage |
| homepage | |
| repository | https://github.com/.../iron_runtime |
| max_upload_size | |
| id | 1956672 |
| size | 92,922 |
Encrypted secrets storage and access control for AI agents.
[dependencies]
iron_secrets = { path = "../iron_secrets" }
use iron_secrets::SecretsManager;
// Initialize with master key from environment
let manager = SecretsManager::new("./secrets.db")?;
// Store encrypted secret
manager.create("openai-api-key", "sk-proj-abc123...")?;
// Retrieve decrypted secret for agent use
let api_key = manager.get("openai-api-key")?;
// Audit trail is automatically maintained
Responsibilities: Provides secure secrets management with AES-256-GCM encryption at rest, Argon2id key derivation, role-based access control, and comprehensive audit logging. Enables safe storage and runtime injection of sensitive credentials (API keys, database passwords, tokens).
In Scope:
sk-proj-abc...xyz)Out of Scope:
| File | Responsibility |
|---|---|
| lib.rs | Secure secrets management for AI agents |
| access_control.rs | Access control for secrets |
| audit.rs | Audit logging for secrets access |
| crypto.rs | Cryptographic operations for secret encryption/decryption |
| error.rs | Error types |
| secrets_manager.rs | Secrets manager service |
| storage.rs | Encrypted storage backend |
Notes:
Apache-2.0