Your First Request
Walk through a complete request. You’ll write code with a secret, send it through Takumo, and see the detection in your dashboard.Prerequisites
- API key created (Authentication)
- AI tool configured (AI Tools)
The walkthrough
Write code with a secret
Here’s a config file with three secrets. In real life, this is your actual codebase.Three secrets. A database connection string, a Stripe key, and an AWS access key.
Send it to your AI tool
Ask your AI tool to refactor the config or add error handling. The exact prompt doesn’t matter. What matters is that your code is about to leave your machine.
What the AI sees
Takumo intercepts the request. It detects three secrets, tokenizes them, and forwards the sanitized code. The AI receives this:The structure is intact. The values are tokens. The AI can reason about the code, suggest refactors, add error handling. It just can’t see the real credentials.
What you get back
The AI responds with refactored code. It references the same tokens. Takumo intercepts the response and rehydrates them:Real values restored. The AI never saw them.
Check the dashboard
Open cloud.takumo.io. The Activity feed shows the detection:
- 3 secrets detected in a single request
- Types:
CONN(database URL),KEY(Stripe),KEY(AWS) - Timestamp, request duration, token count
- All three successfully rehydrated on response
What just happened
- Your code left your editor
- Takumo caught the secrets before they hit the network
- The AI got clean tokens instead of real credentials
- The AI’s response came back with those same tokens
- Takumo swapped the tokens back to real values
- You got working code with real secrets intact