Open Source The Shield Setup Why Heimdall? View GitHub
MIT Licensed · Open Source · Free to Use

Open Source
Heimdall
for AI Secrets
The Gatekeeper
Between AI
and Your Secrets
Where No Secret
Passes
Unguarded
Guard Every Token.
Trust
No Agent.
AI Agents Wield Power.
We Hold
the Keys.
Every Token Guarded.
Every Agent
Watched.
The Shield
Between AI
and Your Secrets

Heimdall is MIT-licensed, open source, and free to use. Clone the repo, self-host the proxy, connect the local agent, and keep real API keys off developer machines and AI agents.

Without Heimdall

The agent sends the real secret in plain sight.

curl https://api.openai.com/v1/models \
  -H "Authorization: Bearer sk-01-1234456"
With Heimdall

The agent only gets a safe placeholder token.

curl https://api.openai.com/v1/models \
  -H "Authorization: Bearer __OPENAI_API_KEY__"
License MIT

Use, modify, fork, and self-host Heimdall freely.

Repo Public on GitHub

Start with git clone and follow the upstream quickstart.

Control Plane Optional Admin Panel

Manage clients, secrets, and audit logs through the built-in panel.

0% of AI-breached orgs had no access controls IBM, 2025
0M secrets leaked on public GitHub in 2024 GitGuardian, 2025
0% of leaked secrets from 2022 still active today GitGuardian, 2025

Open Source. Free To Use.
Ready To Self-Host.

Heimdall ships under the MIT license, lives in a public GitHub repository, and already includes the proxy server, local agent, and optional admin panel you need to run it yourself.

MIT-Licensed

The repo includes an MIT license, so teams can use, modify, and self-host Heimdall without a paywall.

Quickstart Included

The setup path is documented from git clone through proxy setup, local-agent install, and transparent verification.

Optional Admin Panel

Enable the built-in panel to manage clients, stored secrets, AWS-backed secrets, and audit logs at /panel/.

Your AI Agents Hold the Keys
to Your Kingdom

Today, every AI agent gets your raw API keys and secrets. One prompt injection, one compromised agent and your credentials are in the hands of attackers.

Click a threat to see how Heimdall defeats it

Exposed Raw Tokens

AI agents receive your actual API keys in plaintext. A single leak means attackers get full, unrestricted access to your services.

Token Placeholder Proxy

Agents only see safe aliases. Heimdall's proxy swaps them for real credentials at request time the actual secret is never exposed.

Secret Exfiltration

Prompt injection attacks can trick agents into sending your real secrets to attacker-controlled servers and you would never know.

URL-Locked Tokens

Each token is bound to its intended destination. An agent trying to send credentials anywhere unauthorized is instantly blocked.

No Usage Boundaries

Nothing stops an agent from sending your keys to a random third-party URL, or making thousands of calls you never authorized.

Rate Limits & Controls

Set per-token rate limits, daily caps, and budget thresholds. No agent can exceed the boundaries you define.

Zero Visibility

No logs, no rate limits, no audit trail. You have no idea which agent used which token, how many times, or where it was sent.

Full Monitoring & Audit

See exactly which agent used which token, how many times, and to what URL. Real-time dashboards and alerts for every action.

__OPENAI_API_KEY__ sk-proj-9f***
POST malicious.io/exfil BLOCKED
Rate: 847/1000 OK

Your Agents Never Touch
a Real Secret

Instead of handing raw API keys to AI agents, Heimdall gives them placeholders. Use __OPENAI_API_KEY__ in your app and Heimdall injects the real credential at request time. The secret never leaves the vault.

Token Placeholder Proxy

Agents and developers use placeholders like __OPENAI_API_KEY__ or __STRIPE_KEY__. Heimdall swaps them for real credentials at the proxy layer, so the live secret stays server-side.

URL-Locked Tokens

Restrict each secret to its intended destination. __OPENAI_API_KEY__ only works for api.openai.com; any attempt to send it elsewhere is instantly blocked.

Rate Limits & Usage Controls

Set per-token rate limits, daily caps, and budget thresholds. Prevent runaway agents from burning through your API credits or making unauthorized bulk requests.

Full Monitoring & Audit Trail

See exactly which agent used which token, how many times, and to what URL. Real-time dashboards and alerts for every suspicious pattern.