Just-in-time credentials for AI agents

API keys that expire.
Built for AI agents.

One leaked conversation should not mean permanent credential exposure. Agent Nonce issues scoped, time-limited tokens agents use to call APIs — then they're gone.

nonce.agentnonce.com — agent-runtime
$ nonce.create({ service: "stripe", scope: "read:customers", ttl: "5m" })

NONCE an_4xK9mP2rT8wQ1vZ...Qj7r
SERVICE stripe
SCOPE read:customers
TTL 4:59 remaining
STATUS ● ISSUED
USED BY
Step 1
ISSUED
Step 2
USED
Step 3
EXPIRED
Step 4
GONE

Putting API keys in agent prompts is a security disaster.

AI agents need credentials to act. But every method teams use today creates permanent exposure risk that security teams can't accept.

🔑

Keys in System Prompts

The most common approach. If the conversation logs are ever accessed — by an attacker, an audit, or a prompt injection — your production credentials are gone.

♾️

Long-lived Tokens

Service account tokens that live in agent runtimes never expire. One misconfiguration in your agent orchestration layer exposes credentials permanently.

🚫

Security Blocks Agent Deployments

Security teams are blocking AI agent projects entirely because there's no safe way to give agents credentials. Agent Nonce changes that equation.

🔍

No Audit Trail

When an agent uses a shared API key, you have no idea which agent, which task, or which conversation triggered the call. Forensics become impossible.

Just-in-time. Scoped. Self-destroying.

1

Register your services

Connect Agent Nonce to your AWS, GCP, Stripe, or custom API credentials. Your real keys live in our vault — agents never see them directly.

2

Request a nonce at task time

Before an agent starts a task, your orchestration layer requests a scoped nonce: nonce.create({ service: "stripe", scope: "read:customers", ttl: "5m" })

3

Agent uses the nonce

The agent receives a time-limited token. It makes exactly the calls it's authorized to make. The scope prevents credential misuse even if the token is captured.

4

Nonce expires and is deleted

When the TTL expires, the nonce is revoked and permanently deleted. There's nothing left to steal. Every task creates a fresh credential with zero persistence.

Nonces issued, used, expired — in real time.

Every nonce has a lifecycle. Watch it happen.

Nonce Activity Stream — demo workspace
Real-time feed
Time Nonce ID Scope TTL Agent Status

    Security-first design, agent-native API.

    Built specifically for AI agent deployment patterns. Not retrofitted from human auth flows.

    Scoping Minimal Permissions

    Every nonce specifies exactly which operations are allowed. stripe:read:customers cannot be used to write charges — even if the same token is intercepted.

    Lifecycle Automatic Expiry

    TTLs from 30 seconds to 60 minutes. Nonces are cryptographically invalidated when they expire — not just ignored. Nothing persists in the agent runtime.

    Audit Per-call Traceability

    Every nonce is stamped with the requesting agent identity, task context, and a unique nonce ID. Full forensic trail — which agent, which task, which call.

    Vault Secret Zero Protection

    Your real API keys live in our encrypted vault. Agents never receive them. The vault is the only system that ever holds long-lived credentials.

    Integration Native SDK

    Python, TypeScript, and HTTP API. Drop into any agent orchestration framework: LangChain, CrewAI, AutoGen, Claude artifacts, or custom runtimes.

    Policy Rate & Quota Controls

    Set limits on how many nonces an agent can request per hour. Detect runaway agents before they exhaust your API budget or trigger fraud alerts.

    Security teams can finally say yes to AI agents.

    10,000 nonces/month free. No credit card. Production-ready in minutes.

    Generate your first nonce — free

    Unblocking AI agent deployments safely.

    Platform Security Teams

    Stop blocking AI agent projects and start enabling them safely. Agent Nonce gives you a credential model you can audit, scope, and revoke — instead of a hard no.

    AI Engineering Teams

    Stop hardcoding service tokens into system prompts. Request nonces at task time, pass them into your agent context, and know they'll be gone before the logs hit storage.

    Infrastructure Teams

    Replace the service accounts you created for AI agents with per-task nonces. Reduce your credential blast radius to zero without changing your underlying IAM setup.