Use Case
Zero-Trust API Gateway
Remote developers and AI agents have the same credential problem — and the same solution. See how Layr8 keeps API keys out of untrusted compute.
The Credential Exposure Problem
Remote devs and AI agents both need API keys - both create risk
Untrusted Compute
All sharing the same keys
Remote Developers
Contract teams & partners
AI Agents
MCP servers & autonomous tools
Risk Factors
- Credentials in .env files
- Shared credentials across team
- Keys on personal machines
- No credential rotation
EXTERNAL APIs
6 third-party services
Same Problem, Different Actor
Whether it's a remote developer or an AI agent, they both need API credentials to call external services. Those credentials are stored in environment variables, config files, or memory — all vulnerable to extraction.
Toggle between scenarios. The risk is identical.
Interactive demo: Zero-Trust API Gateway for untrusted compute
How It Works
System Architecture
The Zero-Trust API Gateway sits between your untrusted compute (remote devs or AI agents) and external APIs. Credentials never leave the secure gateway.
Remote Developers
Contract teams & partners
AI Agents
MCP servers & autonomous tools
Layr8 Gateway
KMS + Policy Enforcement
External APIs
Stripe, OpenAI, AWS, etc.
Security Guarantees
No Credentials at Edge
API keys never leave the gateway. Untrusted compute holds only a DID — a public identifier with no secret material.
Short-Lived Grants
Access is granted per-request with specific scope, time limits, and single-use constraints. No standing permissions.
Just-in-Time Decryption
API keys are decrypted from KMS only at the moment of execution, then immediately discarded. Never cached, never persisted.
Dual Audit Chains
Both sides maintain independent audit logs with cross-linked hashes. Non-repudiable proof of every request.
How Access Works
- 1 Request with Identity
Untrusted compute (remote dev or AI agent) sends a request with their DID — no credentials attached.
- 2 Identity Verification
Gateway verifies the DID cryptographically — no shared secrets, no password exchange.
- 3 Grant Issuance
Gateway issues a scoped, time-limited, single-use grant for the specific API action requested.
- 4 Just-in-Time Key Injection
API key is decrypted from KMS only at execution moment, used once, then discarded.
- 5 API Execution
Gateway calls the external API on behalf of the requester. Credentials never touch untrusted compute.
- 6 Mutual Audit
Both sides log the transaction with cross-linked hashes. Grant auto-expires — can't be replayed.
Remote Teams
Contract developers need API access but shouldn't hold production credentials. Layr8 grants scoped, time-limited access by identity.
AI Agents
Autonomous agents calling external APIs face the same risk — credentials in memory. Identity-based access eliminates the attack surface.
Cryptographic Proof
Every request is logged on both sides with cross-linked hashes. When disputes arise, you have verifiable proof of exactly what happened.