How It Works
The basic flow
- You have code with secrets
- Takumo replaces secrets with tokens
- Tokenized code goes to Claude
- Claude responds (tokens still in place)
- Takumo swaps tokens back to real values
- You get working code with your actual secrets
Detection
Takumo finds secrets three ways: Pattern matching — Known formats like AWS keys (AKIA...), Stripe keys (sk_live_...), JWTs (eyJ...)
Context analysis — Variables named password, secret, api_key, etc.
Config file parsing — Special handling for .env, YAML, JSON, TOML files
All detection happens locally. Nothing is sent anywhere during this step.
Tokenization
Each secret becomes a token with this format:TAKUMO_v1_KEY_8f3a2b1c| Part | Example | Purpose |
|---|---|---|
| Prefix | __TAKUMO_ | Identifies as a Takumo token |
| Version | v1 | For future compatibility |
| Category | KEY | Type: KEY, SECRET, CONN, HOST, TOKEN, USER |
| Hash | 8f3a2b1c | First 8 chars of SHA-256 (unique per secret) |
| Suffix | __ | Closes the token |
Sessions
A session holds the mapping between tokens and real values:Rehydration
When Claude responds, Takumo finds all tokens and swaps them back:Security guarantees
| Guarantee | What it means |
|---|---|
| No secret transmission | Real values never leave your machine |
| Deterministic tokens | Same secret always produces same token (within a session) |
| One-way tokens | Can’t reverse a token without the session vault |
| Ephemeral sessions | Vault only exists in memory during operation |