Automic Vault
macOS local-first agent runtime security

From the creator of Homebrew

Automic Vault

A hardened package manager and secrets boundary for the tools AI agents run on your Mac.

Top Boundaries

What changes when the agent moves from chat into your local runtime.

v0 surface
1

Keychain-backed secrets

Tools get secrets. Agents do not.

Automic Vault patches critical tools so credentials can move out of plaintext files and into local protected storage. The tool can still do its job; the agent loses the easy read path.

2

Human approval gates

Approval belongs beneath the agent, not inside it.

Built-in agent controls help, but a compromised agent controls its own policy surface. Automic Vault places gates at the local tool layer, where token export, package publishing, and other sensitive actions actually happen.

Automic Vault Agent wants to run npm publish. Approve? Deny Approve
3

Nucleus package manager

Install the agent's tools into a root it cannot rewrite.

Nucleus installs Homebrew, npm, and PyPI packages with hardened roots. Agents can run approved tools without turning the whole developer environment into writable ambient state.

Homebrew npm PyPI /opt
4

Plaintext exposure scan

Find what an agent can see before you start the run.

av secret-scanner searches for credentials that are already exposed in local files. Use it as a fast preflight before giving an autonomous run broad filesystem access.

5

Automic Vault.app

A native Mac surface for package control.

Search packages, inspect metadata, approve installs with Touch ID, follow updates, and use the av CLI when the terminal is the right interface.

Automic Vault app showing package search and package details
Homebrew

Package manager

Automic Vault installs familiar packages, then tightens what agents can mutate underneath them.

1Password

Secrets manager

Central vaults manage secrets. Automic Vault controls whether a local tool can receive one.

Agent controls

Execution policy

Agent-level controls are useful. Tool-layer controls survive below the model and its prompt.

99 secured packages Known toolchains, locked at the credential edge.
gh

gated token reveal and Keychain reads

aws-cli

AWS credentials moved out of plaintext files

terraform

cloud tokens exposed only through a temporary config

pnpm

npm auth token injected only while pnpm runs

vault

Vault token held in Keychain and injected at runtime

Free and open source

Secure the tool layer before the next autonomous run.

Download .dmg View source