Zero secrets in the VM
API keys never enter the sandbox. A per-VM TLS proxy injects credentials at the network layer. If compromised, there’s nothing to steal.
paws (Secure infrastructure for AI agents) provides zero-trust credential injection for AI agents. Secrets never enter the sandbox — they’re injected at the network layer by a per-VM TLS MITM proxy.
curl -fsSL https://getpaws.dev/install.sh | bashYour agent should have nothing worth stealing. When an AI agent runs inside a paws sandbox:
Zero secrets in the VM
API keys never enter the sandbox. A per-VM TLS proxy injects credentials at the network layer. If compromised, there’s nothing to steal.
Sub-second boot
Firecracker memory snapshots restore VMs in under a second. Each session gets a fresh, ephemeral microVM.
Port exposure
Agents run fullstack apps, users access them via port exposure with per-port access control: SSO, PIN, or email whitelist.
Agent harness
Claude Code pre-installed. Provide a prompt and constraints, the workload is auto-generated. More frameworks coming.
Agent in VM: curl https://api.anthropic.com/v1/messages | |-- VM resolves api.anthropic.com (real IP) |-- iptables DNAT rewrites destination --> per-VM proxy |-- Proxy terminates TLS, reads SNI | |-- Domain in allowlist? | |-- YES: inject x-api-key header, forward to real API | |-- NO: drop connection (TCP RST) | |-- Agent sees normal HTTPS response Never saw the API key. Not in env, not in memory, not on disk.