@hexr_agent decorator to register your agent, hexr_llm to make a traced OpenAI call, and hexr_tool to access AWS S3 — all without a single credential in your code. By the end, your agent will have a SPIFFE cryptographic identity, automatic cost attribution, and LLM observability out of the box.
Prerequisites
- Python 3.10 or later
- Docker (for local builds) or a Hexr Cloud account
kubectlconfigured with a Kubernetes cluster
Steps
Write your agent
Create
my_agent.py:my_agent.py
The
VaultClient reads secrets scoped to your agent’s SPIFFE identity — no other agent can access them, even on the same cluster.What just happened?
AST analysis
hexr build analyzed your Python code and discovered the agent name, framework, cloud resources, and A2A configuration — all without running your code.Identity assignment
Your agent received a SPIFFE identity:
spiffe://demo.hexr.dev/agent/my-team/my-first-agent/main. This identity is used for all authentication.Credential injection
When your agent calls
hexr_tool("aws_s3"), the platform automatically exchanges the SPIFFE identity for short-lived AWS credentials. No AWS keys in your code.Next steps
Multi-framework agents
Use CrewAI, LangChain, or AutoGen with Hexr — each role gets its own SPIFFE identity.
Agent-to-agent communication
Enable agents to discover, delegate to, and collaborate with each other over mTLS.
Secure secrets
Store and retrieve API keys with per-agent, per-process isolation.
SDK reference
Full API documentation for
@hexr_agent, hexr_tool, hexr_llm, and more.