Every sandbox pod runs a vault sidecar alongside the harness container. It acts as an HTTPS proxy: all outbound connections from the sandbox flow through it. When the sidecar sees a stub credential in a request, it swaps the stub for the real value inline β before the packet leaves the node.Documentation Index
Fetch the complete documentation index at: https://docs.litellm-agent-platform.ai/llms.txt
Use this file to discover all available pages before exploring further.
Stub credentials
At sandbox boot, the harness env gets stubs instead of real secrets:echo $GITHUB_TOKEN and only ever sees the stub. The real values exist only in the vault sidecarβs process memory.
The swap
Example
What the harness sees:Reserved env keys
The vault and harness runtime manage these β you cannot set them via agent or sessionenv_vars. The API returns 400 if you try.
GIT_TOKEN is used by the entrypoint for the initial git clone, then erased. If you need a token that survives into the agent shell (for git push, gh pr create), pass GITHUB_TOKEN or GH_TOKEN instead β those flow through the vault normally.