B3OS is designed so workflow authors can connect providers and wallets without moving secrets through node payloads. The platform combines organization RBAC, encrypted connectors, hashed API keys, masked execution data, webhook protections, and wallet boundaries.

Security Layers

LayerProtection
AuthenticationUser sessions, API keys, service accounts, and public route boundaries
AuthorizationOrganization roles, scoped API keys, and route-level permission checks
ConnectorsEncrypted credential storage and masked client responses
API keysb3sk_ prefix, one-time reveal, hash storage, scopes, and revocation
WorkflowsDraft/live separation, validation, visibility controls, and publish permissions
ExecutionsSecret masking, sanitized errors, status isolation, and run-level access checks
WebhooksSecret URLs, signed execution hook delivery, HTTPS requirements, and SSRF defenses
WalletsExternal signing boundary, wallet permissions, nonce coordination, and policy-friendly workflow design

API Key Handling

API keys are shown once at creation. B3OS stores a hash and uses scopes to determine what the key can do.

Do not commit API keys, paste them into workflow props, or expose them in client-side code. Rotate a key immediately if it is leaked.

Credential Handling

Connector credentials are encrypted before storage. Clients receive masked metadata, not raw tokens. Action errors are sanitized before they appear in logs or API responses.

Provider credentials belong in connectors. Backend automation credentials belong in API keys or service accounts. Signing authority belongs in wallets.

Webhook Safety

SurfaceProtection
Incoming workflow webhookSecret URL and payload validation
Outbound execution hookSigned delivery and retry tracking
Outbound HTTP actionHTTPS enforcement and private network protections
Public workflow executionVisibility settings, input schema, and authorization boundary

Wallet Safety

Wallet-backed actions should be paired with explicit policy checks. Use branch nodes to verify recipient, asset, amount, chain, and event provenance before transaction nodes.

A workflow that can move funds should be reviewed as production code. Test with representative input, verify every expression, and inspect all public execution paths.

Safe Workflow Checklist

  1. Use connectors instead of raw provider credentials.
  2. Use API keys only from backend systems.
  3. Keep public workflow input schemas narrow.
  4. Validate webhook payloads before side effects.
  5. Add policy branches before wallet actions.
  6. Mask or omit sensitive values from logs.
  7. Rotate credentials after teammate or provider access changes.
  8. Monitor repeated failures and paused workflows.
Production readiness

Use the launch checklist before publishing workflows with connectors, wallets, or public execution surfaces.

Learn More
AI assistant context

Give AI tools the right docs context without sharing private operational data.

Learn More