Documentation Index
Fetch the complete documentation index at: https://authsome.mbajaj.me/llms.txt
Use this file to discover all available pages before exploring further.
authsome run is the most secure way to run an agent. Authsome starts a local HTTP proxy, points the child process at it through HTTP_PROXY, and injects auth headers into outbound requests at the proxy layer. The child process never sees the real credentials.
Prerequisites
Make sure you are logged in to every provider the agent will hit:Run a command
-- is the command and its arguments. Authsome:
- Starts a local HTTP proxy on an ephemeral port.
- Spawns the child with
HTTP_PROXYandHTTPS_PROXYpointing at the proxy. - Sets placeholder environment variables for SDKs that check at startup (for example,
OPENAI_API_KEY=authsome-proxy-managed). - Intercepts outbound requests and injects auth headers based on the destination host.
- Stops the proxy when the child exits.
- Returns the child’s exit code.
Verify it’s working
Check the environment authsome injects:HTTP_PROXYandHTTPS_PROXYpointing athttp://127.0.0.1:<port>(lowercase variants too).OPENAI_API_KEY=authsome-proxy-managed(the real key is never in the environment).
How matching works
Authsome routes requests to providers using each provider’shost_url field.
| Request host | Matches | Header injected |
|---|---|---|
api.openai.com | openai provider | Authorization: Bearer sk-... |
api.github.com | github provider | Authorization: Bearer ghu_... |
example.com | nothing | request passes through unchanged |
host_url matches the request host wins. Ambiguous matches (two providers claim the same host) are not injected — the request is forwarded unchanged.
For the regex form ("host_url": "regex:^api[0-9]+\\.github\\.com$"), see Provider registry.
TLS certificate
On macOS:requests, httpx), you may also need:
Limitations
- HTTP(S) only. WebSockets, gRPC, raw TCP, and database connections bypass the proxy.
- Pinned TLS in some SDKs ignores
HTTP_PROXYor rejects custom CAs. - Default connection only. The proxy uses each provider’s default connection. Per-request connection selection is future work.
- Refresh tokens are never injected. Only access tokens (OAuth2) and API keys leave the proxy.
When to choose run over export
| Pattern | Use when |
|---|---|
authsome run -- ... | The agent calls APIs over HTTP(S), you can install the mitmproxy CA, you want secrets out of the child’s environment. |
authsome export <provider> --format env | The tool can’t use an HTTP proxy, TLS interception isn’t possible, or you need credentials in a long-lived shell. |
What’s next
Proxy injection
The full routing contract and known limitations.
Proxy networking
Diagnose TLS errors, certificate trust, and pinned-cert SDKs.