Documentation Index
Fetch the complete documentation index at: https://docs.svantic.com/llms.txt
Use this file to discover all available pages before exploring further.
Zero-Knowledge Credentials
Svantic uses a zero-knowledge model for handling credentials. Passwords, API keys, tokens, and other secrets never leave your machine — Svantic never sees, transmits, or stores the actual values.How It Works
When an agent needs to use a credential (e.g. filling a login form, authenticating with an API):- The agent identifies the need — it recognizes a login form or an API that requires authentication
- The agent sends a reference — a credential key and a field selector, not the actual value
- Your client tool resolves it locally — retrieves the real value from your local secure storage (keychain, vault, environment variable)
- The value is used locally — filled into the browser, sent to the API, or used for authentication on your machine
- The agent sees only the outcome — success or failure, never the credential value itself
What This Protects Against
| Threat | Protection |
|---|---|
| Server breach | No credentials stored on Svantic’s servers — nothing to steal |
| LLM context leak | Credential values never enter the AI model’s context window |
| Log exposure | Credentials never appear in Svantic’s logs or telemetry |
| Network interception | Values don’t traverse the network between your machine and Svantic |
| Insider access | Svantic operators cannot access credential values — they don’t exist in the system |
Credential Storage
Svantic doesn’t dictate where you store your credentials. The client tool resolves credential keys from whatever storage you configure:- Environment variables — simplest option for development
- OS keychain — macOS Keychain, Windows Credential Manager, Linux Secret Service
- Vault systems — HashiCorp Vault, AWS Secrets Manager, GCP Secret Manager
- Configuration files — encrypted local config (e.g.
settings.jsonwith the SDK’s credential resolver)
CredentialResolver interface. Implement it to connect any secret store.
Sensitive Fields in A2UI
When an agent requests user input via A2UI, fields can be markedsensitive: true. Sensitive fields are:
- Never included in Slack messages, emails, or webhook payloads
- Only rendered in the dashboard or terminal (full A2UI clients)
- Non-dashboard channels show a summary and a link: “This request contains sensitive fields — complete it in the dashboard”
