Back to Skills

Env Secrets Manager

Env & Secrets Manager

$ npx promptcreek add env-secrets-manager

Auto-detects your installed agents and installs the skill to each one.

What This Skill Does

The Env & Secrets Manager skill manages environment-variable hygiene and secrets safety across local development and production workflows. It focuses on auditing, drift awareness, and rotation readiness. This skill is useful for security, devops, and development teams.

When to Use

  • Before pushing commits that touched env/config files
  • During security audits and incident triage
  • When onboarding contributors who need safe env conventions
  • When validating that no obvious secrets are hardcoded
  • Scanning a repository for likely secret leaks
  • Validating no obvious secrets are hardcoded

Key Features

Provides guidance for .env and .env.example lifecycle
Detects secret leaks in repository working trees
Provides severity-based findings for likely credentials
Offers operational pointers for rotation and containment
Provides integration-ready outputs for CI checks
Identifies common pitfalls like committing real values in .env.example

Installation

Run in your project directory:
$ npx promptcreek add env-secrets-manager

Auto-detects your installed agents (Claude Code, Cursor, Codex, etc.) and installs the skill to each one.

View Full Skill Content

Env & Secrets Manager

Tier: POWERFUL

Category: Engineering

Domain: Security / DevOps / Configuration Management


Overview

Manage environment-variable hygiene and secrets safety across local development and production workflows. This skill focuses on practical auditing, drift awareness, and rotation readiness.

Core Capabilities

  • .env and .env.example lifecycle guidance
  • Secret leak detection for repository working trees
  • Severity-based findings for likely credentials
  • Operational pointers for rotation and containment
  • Integration-ready outputs for CI checks

When to Use

  • Before pushing commits that touched env/config files
  • During security audits and incident triage
  • When onboarding contributors who need safe env conventions
  • When validating that no obvious secrets are hardcoded

Quick Start

# Scan a repository for likely secret leaks

python3 scripts/env_auditor.py /path/to/repo

JSON output for CI pipelines

python3 scripts/env_auditor.py /path/to/repo --json


Recommended Workflow

  • Run scripts/env_auditor.py on the repository root.
  • Prioritize critical and high findings first.
  • Rotate real credentials and remove exposed values.
  • Update .env.example and .gitignore as needed.
  • Add or tighten pre-commit/CI secret scanning gates.

Reference Docs

  • references/validation-detection-rotation.md
  • references/secret-patterns.md

Common Pitfalls

  • Committing real values in .env.example
  • Rotating one system but missing downstream consumers
  • Logging secrets during debugging or incident response
  • Treating suspected leaks as low urgency without validation

Best Practices

  • Use a secret manager as the production source of truth.
  • Keep dev env files local and gitignored.
  • Enforce detection in CI before merge.
  • Re-test application paths immediately after credential rotation.
0Installs
0Views

Supported Agents

Claude CodeCursorCodexGemini CLIAiderWindsurfOpenClaw

Details

License
MIT
Source
seeded
Published
3/17/2026

Related Skills