Request Flow
Components
Sealed Tokens
When you create a session, each secret gets a unique sealed token:| Secret Name | Plaintext Value | Sealed Token |
|---|---|---|
ANTHROPIC_API_KEY | sk-ant-abc123... | SEALED_7f3a9b2c... |
SEALED_. They are:
- Opaque — no way to derive the real secret from the token
- Session-scoped — only valid for the session that created them
- Replaced on-the-fly — the proxy scans headers and bodies for the pattern
MITM Proxy
For HTTPS traffic, the proxy acts as a man-in-the-middle:- The sandbox sends a
CONNECTrequest to establish a tunnel - The proxy presents a dynamically-generated TLS certificate signed by its CA
- The sandbox trusts this CA via
NODE_EXTRA_CA_CERTS(or system trust store) - The proxy decrypts traffic, replaces sealed tokens, re-encrypts, and forwards
Session Authentication
Each session has a unique ID and token, passed asProxy-Authorization (Basic auth):
- Username:
sess_<id>— identifies the session - Password:
tok_<token>— authenticates the request
https://sess_id:[email protected]