🆕 Secret References
You can now point Portkey at credentials in AWS Secrets Manager, Azure Key Vault, or HashiCorp Vault instead of pasting keys in the product—using secret_mappings so values are fetched at runtime.
This means:
→ Sensitive material stays in vaults you already control and audit
→ Integrations and virtual keys reference secrets by mapping, not plaintext
→ Rotation and access policies live where your infra team expects them