vastai-security-basicsClaude Skill

Apply Vast.ai security best practices for secrets and access control.

1.9k Stars
259 Forks
2025/10/10

Install & Download

Linux / macOS:

请登录后查看安装命令

Windows (PowerShell):

请登录后查看安装命令

Download and extract to ~/.claude/skills/

namevastai-security-basics
descriptionApply Vast.ai security best practices for API keys and instance access. Use when securing API keys, hardening SSH access to GPU instances, or auditing Vast.ai security configuration. Trigger with phrases like "vastai security", "vastai secrets", "secure vastai", "vastai API key security", "vastai ssh security".
allowed-toolsRead, Write, Grep
version1.0.0
licenseMIT
authorJeremy Longshore <jeremy@intentsolutions.io>
compatible-withclaude-code, codex, openclaw
tags["saas","vast-ai","api","security"]

Vast.ai Security Basics

Overview

Security best practices for Vast.ai API keys, SSH access to GPU instances, data protection on rented hardware, and credential management. Vast.ai instances run as root on shared hardware, requiring careful attention to data lifecycle.

Prerequisites

  • Vast.ai account with API key
  • Understanding of SSH key management
  • Secrets manager available (optional but recommended)

Instructions

Step 1: API Key Management

# Never commit API keys to git
echo '.vast_api_key' >> .gitignore
echo '.env' >> .gitignore

# Use environment variables, not files in repos
export VASTAI_API_KEY="$(vault kv get -field=api_key secret/vastai)"

# Rotate keys periodically at cloud.vast.ai > Account > API Keys
# Fail fast on missing credentials
import os

def get_api_key():
    key = os.environ.get("VASTAI_API_KEY")
    if not key:
        key_file = os.path.expanduser("~/.vast_api_key")
        if os.path.exists(key_file):
            key = open(key_file).read().strip()
    if not key:
        raise ValueError("VASTAI_API_KEY not set and ~/.vast_api_key not found")
    return key

Step 2: SSH Key Security

# Generate a dedicated key pair for Vast.ai instances
ssh-keygen -t ed25519 -f ~/.ssh/vastai_key -C "vastai-instances" -N ""

# Upload public key at cloud.vast.ai > Account > SSH Keys

# Use the dedicated key for connections
ssh -i ~/.ssh/vastai_key -p PORT root@HOST

Step 3: Data Protection on Shared Hardware

def secure_cleanup(instance_id, ssh_host, ssh_port):
    """Securely wipe data before destroying an instance."""
    import subprocess
    # Overwrite sensitive files before instance destruction
    subprocess.run([
        "ssh", "-p", str(ssh_port), "-o", "StrictHostKeyChecking=no",
        f"root@{ssh_host}",
        "rm -rf /workspace/data /workspace/checkpoints /root/.ssh/authorized_keys; "
        "history -c"
    ], check=True)
    # Then destroy
    subprocess.run(["vastai", "destroy", "instance", str(instance_id)], check=True)

Step 4: Network Security

  • Use SSH tunnels for any services exposed on instances
  • Never expose ports with sensitive data to the public internet
  • Transfer data over SCP/SFTP, not unencrypted HTTP
  • Encrypt training data before upload; decrypt on-instance

Step 5: Credential Rotation Checklist

  • API key rotated every 90 days
  • SSH keys dedicated to Vast.ai (not shared with production)
  • Old SSH keys removed from cloud.vast.ai after rotation
  • .vast_api_key file permissions set to 600
  • No API keys in shell history (export from a sourced file, not typed)

Output

  • API key loaded from environment or secrets manager
  • Dedicated SSH key pair for Vast.ai instances
  • Secure cleanup before instance destruction
  • Network security guidelines
  • Credential rotation checklist

Error Handling

ErrorCauseSolution
API key leaked in gitCommitted .env or key fileRotate key immediately; add to .gitignore
SSH key rejectedWrong key or not uploadedVerify key is at cloud.vast.ai > SSH Keys
Data left on destroyed instanceForgot to clean upUse secure_cleanup() before destroy
Key file world-readableWrong permissionschmod 600 ~/.vast_api_key ~/.ssh/vastai_key

Resources

Next Steps

For production deployment checklist, see vastai-prod-checklist.

Examples

Vault integration: Load API key from HashiCorp Vault at runtime, never write to disk, and use SSH agent forwarding for key management.

Ephemeral instances: Treat every Vast.ai instance as throwaway. Never store persistent state on instances; always upload data, process, download results, and destroy.

Similar Claude Skills & Agent Workflows