Skip to main content

Takumo

You paste code into Claude. That code has secrets in it. Now Claude has your secrets. Takumo fixes this. It swaps your secrets for tokens before anything leaves your machine, then swaps them back when the response comes in.
// Your code (example values)
const config = {
  db: "postgres://admin:supersecret@prod.internal:5432/app",
  stripe: "sk_test_abc123EXAMPLE",
  aws: "AKIAIOSFODNN7EXAMPLE"
};

// What Claude sees
const config = {
  db: "__TAKUMO_v1_CONN_a1b2c3__",
  stripe: "__TAKUMO_v1_KEY_d4e5f6__",
  aws: "__TAKUMO_v1_KEY_g7h8i9__"
};

// What you get back (secrets restored)
const config = {
  db: "postgres://admin:supersecret@prod.internal:5432/app",
  stripe: "sk_test_abc123EXAMPLE",
  aws: "AKIAIOSFODNN7EXAMPLE"
};
No config. No setup. Your secrets stay on your machine.

Two parts


What it catches

TypeExamples
CloudAWS access keys, GCP service accounts, Azure connection strings
PaymentsStripe secret/publishable keys, webhook secrets
DatabasesPostgreSQL, MySQL, MongoDB, Redis connection URIs
AuthJWTs, bearer tokens, session secrets, OAuth tokens
Dev toolsGitHub PATs, GitLab tokens, npm tokens, Slack tokens
CryptoRSA/EC/OpenSSH private keys, PGP keys
InfraInternal hostnames (*.internal), private IPs, localhost URLs
GenericAny value assigned to password, secret, api_key, etc.
Full list at Supported Patterns.

Status

Private alpha. Aegis Shield is complete. Sentinel is in development.

Request Access

Join the early access program