This service is under active development. Features may change without notice.
← Home

Your agents need secrets. Not memory.

Give AI agents access to credentials with TTL and read limits. The secret lives just long enough — then it's gone.

See it in action

claude — sirr-mcp

How it works

1

Agent requests a secret

Via MCP tool call, n8n node, or REST API. The agent asks for a credential by key name.

2

Sirr delivers with constraints

The secret is returned with its TTL and read limit intact. The agent uses it for the task at hand.

3

Secret burns after use

Read limit hit? TTL expired? The secret is gone forever. No cleanup, no leaked credentials.

Why ephemeral secrets for agents?

AI agents shouldn't hoard credentials. TTL + read limits = principle of least privilege for machines. No stale secrets in agent memory. No leaked tokens in conversation history.

Give your agents secrets, not memory