A secure local secret vault for developers. Store credentials in your OS keychain — never in plain text.
$ curl -fsSL https://raw.githubusercontent.com/onurkerem/agent-secret/main/install.sh | bash Secrets live in your OS native keychain — macOS Keychain, Windows Credential Manager, or Linux Secret Service. No custom encryption, no plain-text files.
Injects secrets into .env files while preserving comments, blank lines, and key ordering. Special characters are auto-quoted. Files written with 0600 permissions.
Secret values are never printed to the terminal. Verify existence with length checks, list key names only — values stay hidden at every step.
Store secrets once, inject them anywhere. Map stored names to different .env keys across projects — one vault, many environments.
Store secrets with hidden terminal input — nothing echoed to screen or history
Map secret names to different .env keys with SECRET_NAME:FILE_KEY syntax
Check configuration status in scripts with quiet mode exit codes
Works with any file containing .env in the name — .env.local, .env.production, etc.
Secrets live in the OS keychain. When you inject, they're written directly to your .env file — never displayed in the terminal.
agent-secret ships with a skill file for AI coding agents. Agents can verify secrets, inject them into .env files, and set up new projects — all without ever seeing secret values.
Auto-triggers when users mention API keys, credentials, or .env configuration
Smart prefix matching — maps PROJECTX_STRIPE_KEY to STRIPE_KEY
Safe for automated workflows — check and inject commands never expose values
Hooks for Claude Code and Codex automatically block agents from reading .env files — they must use agent-secret instead