Secrets deserve vertices too.
Store sensitive values, temporary credentials, setup codes, API keys, recovery tokens, and one-time handoff secrets behind Node Vertex policy, TTL, audit, and authentication controls.
Secret value
↓
Secret Vertex
↓
Passkey / tenant login / certificate / token policy
↓
TTL, audit, read limits, and revocation
↓
Authorized consumer reads the secrethttps://nodevertex.com/acme/secrets/api-key
https://nodevertex.com/acme/setup/bootstrap-tokenStop pasting secrets into chat.
Teams still move secrets through Slack, email, screenshots, cloud notes, shared docs, and shell history. A Secret Vertex gives sensitive values a governed address instead. The value can expire, require authentication, be audited, and be disabled instantly.
Every workflow starts with a vertex. Sensitive workflows should start with a Secret Vertex.
What can become a Secret Vertex?
- API keys and restricted provider keys
- Temporary setup tokens
- One-time onboarding codes
- Database connection strings
- Recovery values and bootstrap credentials
- Agent enrollment secrets
- IoT provisioning values
- Short-lived customer or support handoff secrets
Built-in controls
- TTL expiration
- Tenant-user or passkey authentication
- Client certificate and signed token options
- Read logging and audit history
- Read-once / burn-after-read patterns
- Disabled, tombstoned, or stealth 404 behavior
- Vertex Firewall conditions
Secret Vertex is not a pastebin.
A pastebin holds text. A Secret Vertex is a policy-governed secret handoff point inside the Node Vertex signaling fabric. It can participate in polygons, trigger listeners, unlock setup workflows, and expire automatically.
Temporary by default
Use TTLs for short-lived setup values and remove stale credentials automatically.
Policy first
Choose public, tenant user, passkey, certificate, bearer token, signed token, or other Vertex Firewall conditions.
Workflow ready
Secret vertices can support onboarding polygons, agent enrollment, integration setup, and secure handoffs.
Create secrets from the CLI
nv create secrets/api-key "$API_KEY" --type secret -ttl 10m nv create setup/bootstrap "$TOKEN" --type secret --access tenantuser --ttl 1h nv create agent/enroll-token "$TOKEN" --secret --read-once --ttl 5m
Create secrets in the control plane
Open Dashboard → Create Vertex, select Secret, choose the authentication model, set a TTL, and create the vertex.
Type: Secret Auth: Passkey TTL: 10m Value: ********
Secret Vertex in a polygon
Developer requests setup access
↓
Secret Vertex created with TTL
↓
Passkey authentication required
↓
Authorized user reads once
↓
Listener records audit and disables the vertexSecure handoffs should be addressable.
Put the secret at a vertex. Protect it. Expire it. Audit it.
Create a Secret Vertex