Overview
Secrets store sensitive values. Create them in/credentials.

Using secrets in expressions
Access a secret in expressions with:Secret types
Tracecat supports these workspace secret types:- Custom (
custom): arbitrary key-value credentials - SSH key (
ssh-key): a single SSH private key - mTLS (
mtls): a TLS client certificate and private key - CA certificate (
ca-cert): a CA certificate bundle
Custom credentials
Custom credentials store arbitrary key-value pairs.TLS and mTLS secrets
Tracecat uses fixed key names:- mTLS secrets use
TLS_CERTIFICATEandTLS_PRIVATE_KEY - CA certificate secrets use
CA_CERTIFICATE - SSH key secrets use
PRIVATE_KEY
AWS credentials
tools.aws_boto3 uses one secret named aws. Its keys are optional.
Supported keys:
- AWS access key ID:
AWS_ACCESS_KEY_ID - AWS secret access key:
AWS_SECRET_ACCESS_KEY - AWS session token:
AWS_SESSION_TOKEN - AWS region:
AWS_REGION - AWS profile:
AWS_PROFILE - AWS role ARN:
AWS_ROLE_ARN
AWS_ROLE_ARNAWS_PROFILEAWS_ACCESS_KEY_ID+AWS_SECRET_ACCESS_KEY+AWS_SESSION_TOKENAWS_ACCESS_KEY_ID+AWS_SECRET_ACCESS_KEY
AWS_ROLE_ARN is present, Tracecat uses STS AssumeRole and injects TRACECAT_AWS_EXTERNAL_ID at runtime.
Secret environments
Every secret belongs to a Workflow environment.- Default source: the workflow default environment in Workflows.
- Override: per action in Actions control flow.
- Fallback:
default.
- Different CrowdStrike tenants for
prod,staging, orlab - Multiple Slack apps for separate workspaces or business units
- Separate sandbox and production API credentials for the same vendor
Access secrets in agents
Agents can use secret expressions in tool arguments and integration configuration. Secret values are resolved during tool execution and are not sent to the LLM provider.Related pages
- See Pre-built credentials for provider-specific credential templates for built-in integrations.
- See OAuth for integrations that authenticate with OAuth flows.
- See MCP for MCP integrations and secure environment-based settings.
- See Expressions for how expressions work across triggers, actions, secrets, and variables.