| ▲ | robbomacrae 4 hours ago | |
This is amazing. I agree with your take except "You’re not actually zeroizing the secrets"... I think it is actually calling zeroize() explicitly after use. Can I get your review/roast on my approach with OrcaBot.com? DM me if I can incentivize you.. Code is available: https://github.com/Hyper-Int/OrcaBot enveil = encrypt-at-rest, decrypt-into-env-vars and hope the process doesn't look. Orcabot = secrets never enter the LLM's process at all. The broker is a separate process that acts as a credential-injecting reverse proxy. The LLM's SDK thinks it's talking to localhost (the broker adds the real auth header and forwards to the real API). The secret crosses a process boundary that the LLM cannot reach. | ||