Documentation Index
Fetch the complete documentation index at: https://docs.runtools.ai/llms.txt
Use this file to discover all available pages before exploring further.
Overview
RunTools secrets store API keys, provider credentials, and custom values for tools, agents, and workflows. Secrets live on the tools service:Create Or Rotate
List Metadata
List responses never include secret values.Reveal When Allowed
Delete
Tool Credential Overrides
UsecredentialOverrides to keep actual secret values server-side during tool execution:
API Reference
| Method | Path | Description |
|---|---|---|
GET | /v1/secrets | List metadata |
POST | /v1/secrets | Create or rotate a secret |
GET | /v1/secrets/{name} | Get metadata |
POST | /v1/secrets/{name}/reveal | Reveal when policy allows |
DELETE | /v1/secrets/{name} | Delete a secret |
category, secretScope=user|org, all=true, orgWide=true, and admin-targeted user_id.
Best Practices
Prefer connected apps for OAuth providers
Prefer connected apps for OAuth providers
GitHub, Google, Slack, and similar providers are better handled through OAuth when the tool supports it.
Use org-shared secrets intentionally
Use org-shared secrets intentionally
Keep names stable
Keep names stable
Rotate by updating the value behind a stable name, such as
ANTHROPIC_API_KEY.Avoid logging revealed values
Avoid logging revealed values
Treat revealed values as sensitive and avoid printing them in CI logs.