{% extends "console_page.html" %} {% load waffle_tags %} {% block console_content %}
All secrets are encrypted with AES-256-GCM before storage. Credential secrets can be used via placeholders like x_api_key. Environment variable secrets are injected into sandbox execution.
{% if has_secrets %} Credential and environment variable secrets configured {% else %} No secrets configured yet {% endif %}
| Secret Name | Description | Status | Actions |
|---|---|---|---|
|
{{ secret_name }}
Key: |
{% if secret_data.description %}
{{ secret_data.description }} {% else %} No description provided {% endif %} |
Encrypted |
| Secret Name | Env Key | Description | Actions |
|---|---|---|---|
| {{ secret.name }} |
{{ secret.key }}
|
{% if secret.description %}
{{ secret.description }} {% else %} No description provided {% endif %} |
Add your first secret to get started. Secrets allow your agent to access sensitive data like API keys, passwords, and tokens securely.
Example names: "X Password", "API Key", "Database Username"
Secret keys will be generated automatically: x_password, api_key, database_username
{% if has_requested_secrets %} {{ requested_secrets|length }} pending request{{ requested_secrets|length|pluralize }} awaiting values {% else %} No pending requests {% endif %}