How it works
When you create a credential via Skyvern’s API, two things happen: Skyvern stores metadata for easy lookup: credential names, IDs likecred_xyz789, usernames, and non-sensitive identifiers (like the last 4 digits of a card). This lets you list and manage credentials without exposing secrets.
Your vault stores the secrets: passwords, TOTP keys, full card numbers, and API tokens. Skyvern only retrieves these at runtime when needed, then discards them immediately after use.
This gives you:
- Friendly IDs: Reference credentials by
cred_xyz789instead of vault-specific item IDs - Vault abstraction: Switch between Bitwarden, Azure, or custom vaults without changing your code
- Security by design: Secrets never appear in logs, API responses, or LLM prompts
Credential types
Skyvern supports three credential types, each designed for specific use cases.Password credentials
Store usernames, passwords, and optional TOTP secrets for website logins.Credit card credentials
Store payment information for checkout automations. Skyvern only stores the last 4 digits in metadata for identification.visa, mastercard, amex, discover
Secret credentials
Store API keys, tokens, or other sensitive strings for use in HTTP Request blocks or custom integrations.Vault integrations
Skyvern integrates with external password managers so credentials never leave your infrastructure.Bitwarden
Connect Skyvern to your Bitwarden organization to use existing vault items. Cloud setup:- Create a Bitwarden organization at bitwarden.com
- Create a collection to share with Skyvern
- Contact support@skyvern.com to complete the integration
- Get your collection ID from the Bitwarden URL
- Reference credentials by collection ID in your workflows
1Password
Connect via service account tokens for secure credential access.- Create a 1Password service account with access to your vault
- Store the service account token in Skyvern:
- Reference vault items by ID in your workflows
Azure Key Vault
Store credentials in Azure Key Vault for enterprise environments.Custom HTTP vault
Integrate your own credential service via HTTP API. Your service must implement these endpoints:| Endpoint | Method | Description |
|---|---|---|
{base_url} | POST | Create credential, return {"id": "..."} |
{base_url}/{id} | GET | Return credential data |
{base_url}/{id} | DELETE | Delete credential |
Using credentials in workflows
Workflows are the recommended way to use credentials. Add a credential parameter to your workflow, then reference it in login blocks.You can also manage credentials directly from the Skyvern UI. See the Managing Credentials guide for details.
Using credentials with login
For direct login automations, use the dedicatedlogin method which handles credential retrieval and authentication:
| Type | Description |
|---|---|
skyvern | Use credentials created via Skyvern’s API (stored in your configured vault) |
bitwarden | Directly reference Bitwarden vault items by collection/item ID |
1password | Directly reference 1Password vault items by vault/item ID |
azure_vault | Directly reference Azure Key Vault secrets by name |
Managing credentials
List credentials
Get credential metadata
The GET endpoint returns metadata only, never the actual credential values. This is by design for security.
Delete a credential
Security architecture
Skyvern’s credential handling is designed with security at every layer:- Vault fetch: Credentials are retrieved from your external vault only when needed
- Memory only: Values exist in Skyvern’s memory briefly during execution
- Placeholder tokens: When sending data to LLMs, real values are replaced with tokens like
BW_PASSWORD - No persistence: Real values are never written to databases, logs, or API responses
- LLM isolation: Credentials are never sent to language models. The LLM sees only placeholder tokens
When you view a run’s artifacts or recordings, you’ll see placeholder values like
BW_PASSWORD, BW_USERNAME, or BW_TOTP instead of actual credentials.Next steps
Handle 2FA
Set up two-factor authentication for your automations
Troubleshooting
Debug common login failures

