Use Case

Zero-Trust API Gateway

Remote developers and AI agents have the same credential problem — and the same solution. See how Layr8 keeps API keys out of untrusted compute.

The Credential Exposure Problem

Remote devs and AI agents both need API keys - both create risk

Act 1/4

Untrusted Compute

All sharing the same keys

Remote Developers

Contract teams & partners

AI Agents

MCP servers & autonomous tools

.env
Shared by all
STRIPE_SECRET_KEY=••••••••••••
OPENAI_API_KEY=••••••••••••
AWS_SECRET_ACCESS_KEY=••••••••••••
TWILIO_AUTH_TOKEN=••••••••••••
SENDGRID_API_KEY=••••••••••••
GITHUB_TOKEN=••••••••••••

Risk Factors

  • Credentials in .env files
  • Shared credentials across team
  • Keys on personal machines
  • No credential rotation

EXTERNAL APIs

6 third-party services

Stripe
OpenAI
AWS
Twilio
SendGrid
GitHub

Same Problem, Different Actor

Whether it's a remote developer or an AI agent, they both need API credentials to call external services. Those credentials are stored in environment variables, config files, or memory — all vulnerable to extraction.

Toggle between scenarios. The risk is identical.

Interactive demo: Zero-Trust API Gateway for untrusted compute

How It Works

System Architecture

The Zero-Trust API Gateway sits between your untrusted compute (remote devs or AI agents) and external APIs. Credentials never leave the secure gateway.

Remote Developers

Contract teams & partners

AI Agents

MCP servers & autonomous tools

Identity only (DID)

Layr8 Gateway

KMS + Policy Enforcement

API keys encrypted at rest

External APIs

Stripe, OpenAI, AWS, etc.

Protected resources

Security Guarantees

No Credentials at Edge

API keys never leave the gateway. Untrusted compute holds only a DID — a public identifier with no secret material.

Short-Lived Grants

Access is granted per-request with specific scope, time limits, and single-use constraints. No standing permissions.

Just-in-Time Decryption

API keys are decrypted from KMS only at the moment of execution, then immediately discarded. Never cached, never persisted.

Dual Audit Chains

Both sides maintain independent audit logs with cross-linked hashes. Non-repudiable proof of every request.

How Access Works

  1. 1
    Request with Identity

    Untrusted compute (remote dev or AI agent) sends a request with their DID — no credentials attached.

  2. 2
    Identity Verification

    Gateway verifies the DID cryptographically — no shared secrets, no password exchange.

  3. 3
    Grant Issuance

    Gateway issues a scoped, time-limited, single-use grant for the specific API action requested.

  4. 4
    Just-in-Time Key Injection

    API key is decrypted from KMS only at execution moment, used once, then discarded.

  5. 5
    API Execution

    Gateway calls the external API on behalf of the requester. Credentials never touch untrusted compute.

  6. 6
    Mutual Audit

    Both sides log the transaction with cross-linked hashes. Grant auto-expires — can't be replayed.

Remote Teams

Contract developers need API access but shouldn't hold production credentials. Layr8 grants scoped, time-limited access by identity.

AI Agents

Autonomous agents calling external APIs face the same risk — credentials in memory. Identity-based access eliminates the attack surface.

Cryptographic Proof

Every request is logged on both sides with cross-linked hashes. When disputes arise, you have verifiable proof of exactly what happened.