Proxy Gateway
The Proxy Gateway sits between agent containers and external APIs. Agents make requests to the proxy, and Steward injects the real credentials before forwarding.How It Works
Agent code that normally calls an API directly:- Strips the dummy auth header
- Looks up the route for
api.openai.com - Decrypts the real API key from the Secret Vault
- Injects it as
Authorization: Bearer sk-proj-abc123... - Forwards to
https://api.openai.com/v1/chat/completions
URL Routing
The proxy supports two routing modes:- Named Aliases (Recommended)
- Direct Host Routing
Friendly names that map to real API hosts:Aliases are configured per-tenant and can be customized.
Common Route Configurations
Request Pipeline
Every proxied request passes through this pipeline:Network Isolation
The real security win comes from combining the proxy with Docker network isolation:- ❌ Cannot exfiltrate data to arbitrary URLs
- ❌ Cannot access other agents’ data
- ❌ Cannot spend more than policy allows
- ✅ Can only communicate through Steward (which logs everything)
Performance
| Metric | Target | Notes |
|---|---|---|
| Policy evaluation | < 5ms | Cached in Redis, 30s TTL |
| Credential decryption | < 1ms | AES-256-GCM is fast |
| Total proxy overhead | 5-15ms | Negligible vs API latency (100-2000ms) |
Related
- Secret Vault — How credentials are encrypted and stored
- Policy Engine — Policy evaluation on every request
- Routes API Reference — Configure credential injection routes
- Proxy API Reference — Proxy usage documentation