Credentials
Most agents need an API key for their model provider. An HTTP/HTTPS proxy on your host intercepts outbound requests from the sandbox, looks up the matching credential on the host, and overwrites the auth header before forwarding. The real credential stays on the host; the sandbox sees only a sentinel value. For the security model behind this, see Credential isolation.
How credential injection works
The proxy needs three things to inject a credential: which outbound traffic to match, what header to write, and what value to use. The kit (or built-in agent definition) declares the first two. You provide the value on the host.
There are two host-side stores, plus a host shell fallback:
Stored secrets, keyed on a service identifier: built-in agents declare service identifiers (
anthropic,openai,github, etc.) in their kit specs; custom kits can declare their own.sbx secret setstores a value keyed on that identifier. When a sandboxed request matches a service's domain, the proxy reads the stored value and writes the configured header. Inside the sandbox, the environment variable holds a sentinel likeproxy-managed, so SDKs that read the variable see something non-empty without seeing the real secret. See Stored secrets.Stored secrets, keyed on a target domain and environment variable name:
sbx secret set-customstores a value alongside a target domain, an environment variable name, and an optional placeholder. The sandbox sees the placeholder; the proxy substitutes it with the real value anywhere it appears in outbound traffic to that domain. Use this when the service-identifier model doesn't fit — for example, when the agent validates the variable format at boot, or when the credential lands in a request body. See Custom secrets.Host shell environment variables: as a fallback, the proxy reads from your shell environment. Useful for one-off testing or development; stored secrets are preferred because shell environment variables are plaintext and visible to other processes running as your user. See Environment variables.
If both a stored secret and a host environment variable are set for the same service, the stored secret takes precedence. For multi-provider agents (OpenCode, Docker Agent), the proxy selects credentials based on the API endpoint being called. See individual agent pages for provider-specific details.
Stored secrets
sbx secret set stores credentials in your OS keychain, keyed on a service
identifier. Built-in agents declare a fixed set of services. Custom kits can
declare their own. The same sbx secret set flow works for both.
Store a secret
$ sbx secret set -g anthropic
This prompts you for the secret value interactively. The -g flag stores the
secret globally so it's available to all sandboxes. To scope a secret to a
specific sandbox instead:
$ sbx secret set my-sandbox openai
NoteA sandbox-scoped secret takes effect immediately, even if the sandbox is running. A global secret (
-g) only applies when a sandbox is created. If you set or change a global secret while a sandbox is running, recreate the sandbox for the new value to take effect.
You can also pipe in a value for non-interactive use:
$ echo "$ANTHROPIC_API_KEY" | sbx secret set -g anthropic
Built-in services
Each built-in service name maps to a set of environment variables the proxy checks and the API domains it authenticates requests to:
| Service | Environment variables | API domains |
|---|---|---|
anthropic | ANTHROPIC_API_KEY | api.anthropic.com |
aws | AWS_ACCESS_KEY_ID | AWS Bedrock endpoints |
github | GH_TOKEN, GITHUB_TOKEN | api.github.com, github.com |
google | GEMINI_API_KEY, GOOGLE_API_KEY | generativelanguage.googleapis.com |
groq | GROQ_API_KEY | api.groq.com |
mistral | MISTRAL_API_KEY | api.mistral.ai |
nebius | NEBIUS_API_KEY | api.studio.nebius.ai |
openai | OPENAI_API_KEY | api.openai.com |
xai | XAI_API_KEY | api.x.ai |
When you store a secret with sbx secret set -g <service>, the proxy uses it
the same way it would use the corresponding environment variable. You don't
need to set both.
Services declared by kits
Custom kits can declare their own service identifiers in spec.yaml —
they're not limited to the table above. To provide a credential for a
kit-declared service, run sbx secret set with the same identifier the kit
declares under credentials.sources:
$ sbx secret set -g my-service
There's no separate registration step; the keychain entry is keyed on the identifier the kit already uses. See Authenticate to external services for the kit-side wiring.
List and remove secrets
List all stored secrets:
$ sbx secret ls
SCOPE SERVICE SECRET
(global) github gho_GCaw4o****...****43qy
Remove a secret:
$ sbx secret rm -g github
NoteRunning
sbx resetdeletes all stored secrets along with all sandbox state. You'll need to re-add your secrets after a reset.
GitHub token
The github service gives the agent access to the gh CLI inside the
sandbox. Pass your existing GitHub CLI token:
$ echo "$(gh auth token)" | sbx secret set -g github
This is useful for agents that create pull requests, open issues, or interact with GitHub APIs on your behalf.
SSH agent
If your host has an SSH agent and SSH_AUTH_SOCK is set, Docker Sandboxes
forwards the agent into the sandbox and sets SSH_AUTH_SOCK there. The
private keys stay on your host. Processes inside the sandbox can request
signatures from the forwarded agent, but they can't read or copy the private
key.
Use SSH agent forwarding for Git operations over SSH and SSH-based commit signing. The signing key must be loaded in the host SSH agent for sandboxed commit signing to work. Outbound SSH connections are still subject to sandbox network policy. For details, see Signed commits.
Custom secrets
ImportantCustom secrets are experimental. The
set-customcommand is hidden fromsbx --help, and behavior, flags, and the placeholder format may change.
For credentials that don't fit the service-identifier model — for example,
when an agent validates the environment variable format at boot, or when the
credential lands in a request body rather than a header — use
sbx secret set-custom. The secret is keyed on a target domain, an
environment variable name, and an optional placeholder string, instead of a
service identifier.
$ sbx secret set-custom -g \
--host api.example.com \
--env API_KEY \
--value <secret>
WarningPassing the secret as
--value <secret>records it in your shell history and exposes it to other processes running as your user. Avoid pasting real credentials inline — read the value from a variable that's already in your environment, and clear shell history if a real secret was passed on the command line.
Inside the sandbox, API_KEY is set to a generated placeholder (for example,
sbx-cs-<rand>). When a sandboxed process sends a request to
api.example.com and the placeholder appears anywhere in the request, the
proxy replaces it with the real value. The agent never sees the real secret.
Prefer the service-based flow whenever it's an option — the kit handles the wiring; you only provide the value.
Environment variables
As an alternative to stored secrets, export the relevant environment variable in your shell before running a sandbox:
$ export ANTHROPIC_API_KEY=sk-ant-api03-xxxxx
$ sbx run claude
The proxy reads the variable from your terminal session. See individual agent pages for the variable names each agent expects.
NoteThese environment variables are set on your host, not inside the sandbox. Sandbox agents are pre-configured to use credentials managed by the host-side proxy. For custom environment variables not tied to a built-in service, see Setting custom environment variables.
Best practices
- Use stored secrets over environment variables. The OS keychain encrypts credentials at rest and controls access, while environment variables are plaintext in your shell.
- Don't set API keys manually inside the sandbox. Sandbox agents are pre-configured to use proxy-managed credentials.
- For Claude Code and Codex, OAuth is another secure option: the flow runs on
the host, so the token is never exposed inside the sandbox. For Claude Code,
use
/logininside the agent. For Codex, runsbx secret set -g openai --oauth.
Custom templates and placeholder values
When building custom templates or installing agents manually in a shell
sandbox, some agents require environment variables like OPENAI_API_KEY to be
set before they start. Set these to placeholder values (e.g. proxy-managed)
if needed. The proxy injects actual credentials regardless of the environment
variable value.