Every space has an encrypted vault. Secrets are encrypted at rest, and the AI never sees plaintext values. The AI works with secret references, and the server substitutes the real value at runtime.Documentation Index
Fetch the complete documentation index at: https://docs.kazzle.com/llms.txt
Use this file to discover all available pages before exploring further.
Secret types
String - a simple key-value environment variable. The secret name becomes the env var key.Collections and environments
Secrets are organized into collections (groups) and environments (buckets within a collection).- Collections have a slug unique per space (e.g.
my-saas). Used in CLI commands andkazzle.config.ts. - Environments have a slug unique per collection (e.g.
dev,prod). Create them explicitly after creating a collection. - Untagged secrets (no environment) are included in every environment. Use them for values that don’t change between dev and prod.
Injection with the Kazzle CLI
Secrets are injected into processes viakazzle run in your package.json scripts:
kazzle run calls the server, resolves secrets for the collection + environment, exports them as environment variables, and execs the child command. Secrets exist only in process memory - never on disk.
CLI commands
| Command | What it does |
|---|---|
kazzle run --collection=X --env=Y -- <cmd> | Injects secrets as env vars, then runs <cmd> |
kazzle secrets list --collection=X | Lists secret names and IDs for a collection |
kazzle secrets export --collection=X --env=Y | Exports secrets as KEY=VALUE lines |
kazzle git.credential | Git credential helper - resolves repo credentials from the vault |
Secret value references
A secret’s value can reference another secret field using${secret.<uuid>.<field>}:
How the AI uses secrets
The AI never sees plaintext secret values. It uses${secret.<secretId>.<field>} templates in tool calls:
Production deploy
For deployed apps, secrets are declared per component inkazzle.config.ts:
- Process parts: secrets are pushed to the cloud as runtime environment variables.
- UI parts: only secrets prefixed with
VITE_are inlined at build time so they can ship to the browser.
Security model
- Secrets are encrypted at rest. Encryption keys are managed for you.
- The AI works with secret references, never plaintext values. Chat logs and tool results never contain secrets.
- The
kazzleCLI authenticates withKAZZLE_API_KEYover HTTPS. No secrets touch disk. - Two-factor (TOTP) secrets support automatic code generation.