HashiCorp Vault Agent creates a sidecar that talks to Vault server and injects secrets as files into containers. The agent presumably uses Kubernetes Service Account in some way. But ultimately there must be a secret zero somewhere, protected somehow, and I would like to understand how it works.
What does Vault Agent use to authenticate with Vault Server, and how is that stored on disk, protected by what?