🎁 Get the FREE AI Skills Starter Guide β€” Subscribe β†’
BytesAgainBytesAgain
πŸ¦€ ClawHub

env-secrets-manager

by @alirezarezvani

Env & Secrets Manager

Versionv1.0.0
Installs3
⚑ When to Use
TriggerAction
- Before every commit β€” scan for accidentally staged secrets
- Post-incident response β€” leaked credential rotation procedure
- Onboarding new developers β€” they need all vars, not just some
- Environment drift investigation β€” prod behaving differently from staging
---
πŸ“‹ Tips & Best Practices

1. Secret manager is source of truth β€” .env files are for local dev only; never in prod 2. Rotate on a schedule, not just after incidents β€” quarterly minimum for long-lived keys 3. Principle of least privilege β€” each service gets its own API key with minimal permissions 4. Audit access β€” log every secret read in Vault/SSM; alert on anomalous access 5. Never log secrets β€” add log scrubbing middleware that redacts known secret patterns 6. Use short-lived credentials β€” prefer OIDC/instance roles over long-lived access keys 7. Separate secrets per environment β€” never share a key between dev and prod 8. Document rotation runbooks β€” before an incident, not during one

View on ClawHub
TERMINAL
clawhub install env-secrets-manager

πŸ§ͺ Use this skill with your agent

Most visitors already have an agent. Pick your environment, install or copy the workflow, then run the smoke-test prompt above.

πŸ” Can't find the right skill?

Search 60,000+ AI agent skills β€” free, no login needed.

Search Skills β†’