logoalt Hacker News

robbomacraetoday at 9:27 AM0 repliesview on HN

This is amazing. I agree with your take except "You’re not actually zeroizing the secrets"... I think it is actually calling zeroize() explicitly after use.

Can I get your review/roast on my approach with OrcaBot.com? DM me if I can incentivize you.. Code is available:

https://github.com/Hyper-Int/OrcaBot

enveil = encrypt-at-rest, decrypt-into-env-vars and hope the process doesn't look.

Orcabot = secrets never enter the LLM's process at all. The broker is a separate process that acts as a credential-injecting reverse proxy. The LLM's SDK thinks it's talking to localhost (the broker adds the real auth header and forwards to the real API). The secret crosses a process boundary that the LLM cannot reach.