
An open-source credential manager for AI agents
If you're running AI agents that call external APIs, you probably have API keys scattered across .env files, config directories, and maybe a Slack DM or two. It works — until it doesn't. When running agents across OpenAI, Anthropic, AWS, and GitHub simultaneously, there are some difficult questions that cannot be answered: Which agent has access to which key? Has anything expired? When one agent delegates a key to another agent in a chain, who's actually accountable? As an experiment, I built ID Wispera — an open-source tool that treats agent credentials like passports. The idea Every credential gets a structured "passport" with: Scope and classification — is this an access-level key or a privileged admin credential? Expiry tracking — when does it expire, and who gets notified? Delegation chain — if Human → Agent A → Agent B, that chain is recorded with optional scope narrowing at each hop Audit trail — every access, share, revoke, and policy check is logged The passport/visa metaphor
Continue reading on Dev.to
Opens in a new tab


