Skip to content

Secrets Management

CORE supports a simple, local, developer-friendly secrets system. It is intentionally minimal because CORE is a governed development framework, not a production secret vault.

Secrets are used for:

  • LLM API keys (OpenAI, Anthropic, custom endpoints)
  • Local provider configs
  • Credentials required for autonomous development

Secrets are never committed, never leave your machine, and are optional unless you run autonomous tasks.


1. Where Secrets Are Stored

Secrets are stored locally (in your user environment), encrypted or obfuscated using the mechanism implemented under:

src/services/secrets_service.py

They are not:

  • shared,
  • synced,
  • uploaded,
  • committed.

This design ensures CORE stays portable and governance-safe.


2. Initializing Secrets

Before using any LLM-based autonomous functionality, initialize the secrets store:

poetry run core-admin secrets init

This creates a local secrets container appropriate for your environment.


3. Setting Secrets

Set a secret (e.g., LLM provider key):

poetry run core-admin secrets set OPENAI_API_KEY

You will be prompted to provide the value.

To set a custom provider key:

poetry run core-admin secrets set MY_PROVIDER_TOKEN

The key name is arbitrary — CORE passes secrets verbatim to LLM clients and providers.


4. Listing Secrets (If supported)

Some versions of the CLI may support:

poetry run core-admin secrets list

If not available, rely on the secrets file directly or re-set as needed.


5. Using Secrets in Autonomous Development

Once a key is set, autonomous workflows will automatically use it:

poetry run core-admin develop feature "Add diagnostics"

The Will (agents) will pull secrets from secrets_service.py when connecting to providers.

No additional configuration is needed unless using:

  • custom endpoints,
  • local Ollama servers,
  • advanced provider setups.

6. Removing Secrets

If supported:

poetry run core-admin secrets unset OPENAI_API_KEY

Otherwise simply delete the secrets file from your local environment (location depends on OS).

This affects only your machine — no project files store secret values.


7. Security Principles

CORE follows clear rules about secrets:

✔ Secrets stay local

No syncing, no uploading, no commit.

✔ Secrets do not bypass governance

Agents cannot use undeclared or unapproved providers.

✔ Minimal footprint

CORE stores only what is needed for autonomous features.

✔ Reversible

You can wipe all secrets without affecting the repo.


8. Troubleshooting

"No API key found"

Run:

poetry run core-admin secrets set OPENAI_API_KEY

"Autonomy disabled"

Ensure the secrets are set and readable.

"Provider authentication failed"

Verify:

  • API key validity
  • network connectivity
  • provider availability

9. Summary

Secrets Management in CORE is:

  • simple,
  • local,
  • safe,
  • minimal,
  • governed.

It enables LLM-powered features without compromising security or constitutional integrity.

Next steps:

  • Return to Starter Kits
  • Explore CLI Workflows
  • Or continue to Developer Contributing Guide