Murmur never stores your credentials in plaintext — not on disk, not in transit, not in the control plane. Developer profiles are encrypted client-side and decrypted only in agent VM process memory.Documentation Index
Fetch the complete documentation index at: https://docs.murmur.dev/llms.txt
Use this file to discover all available pages before exploring further.
Developer profiles
A developer profile contains everything an agent needs to work on your behalf:| Credential | Purpose |
|---|---|
| GitHub token | Clone repos, open PRs, comment, push |
| Claude OAuth token + refresh token | Authenticate Claude Code |
| Anthropic API key | Alternative to OAuth |
| OpenAI API key | For Codex backend (optional) |
| SSH signing key (ed25519) | Sign commits on VMs |
| Git identity | user.name and user.email for commits |
| Identity token | Authenticate to Murmur API from VMs |
How encryption works
murmur setupsends your credentials to the platform API, which encrypts them with KMS- The KMS-encrypted blob is stored in
.murmur/murmur.local.yaml(gitignored) - When an agent starts, the blob is sent to the control plane
- The control worker (the only process with KMS decrypt permission) decrypts and re-seals the blob with the VM’s ephemeral X25519 public key (NaCl box encryption)
- The VM decrypts credentials in process memory only — never written to filesystem
- When the agent stops, credentials are destroyed with the process
Running murmur setup
- Discovers your GitHub identity via
gh auth token - Lists your available tenants (personal + orgs with the Macroscope GitHub App)
- Prompts for Claude credentials (OAuth browser flow or API key)
- Optionally discovers an OpenAI API key
- Generates an SSH signing key for commit verification
- Creates
.murmur/murmur.yamlif it doesn’t exist - Encrypts and writes
.murmur/murmur.local.yaml
Tenant secrets
Tenant secrets are shared across your team. They’re KMS-encrypted in the catalog and injected as environment variables on agent VMs.MURMUR_SECRET_INTERNAL_API_KEY on the VM. Reference them in your workspace:
Developer secrets
Developer secrets (user-secret kind) are per-developer encrypted values. They’re encrypted with additional authenticated data (AAD) tied to your identity, so only your agents can decrypt them.
Credential rotation
Rotate credentials on a running agent and all its children:Commit signing
Duringmurmur setup, an ed25519 SSH signing key is generated and encrypted in your profile. On VMs, this key is used to sign git commits. You can upload the public key to GitHub for verified commit badges: