How should you store runtime keys?
The recommended approach is an environment variable:- Never commit keys to git. Add
credentials.jsonand.envto your.gitignore. - Never hardcode keys in source code. Even in private repositories, hardcoded keys end up in build artifacts, logs, and error reports.
- Never share keys across agents. Each agent gets its own runtime key. Sharing keys makes revocation impossible without disrupting multiple agents.
What do the key prefixes mean?
The prefix tells you the key’s environment and which chains it can access:| Prefix | Environment | Chains |
|---|---|---|
mndt_test_* | Testnet | Sepolia, Base Sepolia |
mndt_live_* | Production | Ethereum, Base |
How do you rotate a runtime key?
Rotate keys through the dashboard or the API:- Dashboard: Navigate to Agents, select the agent, click “Regenerate Key.”
- API:
POST /api/agents/{agentId}/regenerate-key(requires dashboard auth, not runtime key auth).
What should you do if a key is compromised?
Regenerate the key immediately. The old key becomes invalid the moment the new one is issued. Any in-flight intents (transactions already validated but not yet confirmed) continue to their terminal state. New validation requests with the old key are rejected. After regeneration:- Update the key in your agent’s environment.
- Review the audit log for unauthorized transactions made with the compromised key.
- Check whether the circuit breaker should be tripped while you investigate.
Register an Agent
Get your first runtime key
Chain Reference
Supported chains and contract addresses
Agent Management
Manage agents from the dashboard