secrets-management

Community

Encrypt secrets, manage securely with Nix.

Authoraitchwhy
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill provides a secure and reproducible way to manage encrypted secrets using sops-nix with Age encryption. It ensures sensitive data is never hardcoded or committed in plaintext, enhancing security and simplifying secret distribution across Nix-managed systems.

Core Features & Use Cases

  • Age Encryption Setup: Guides on generating Age keys and configuring .sops.yaml for secure encryption and decryption of secrets.
  • Nix Module Integration: Patterns for defining and referencing secrets within nix-darwin and NixOS modules, ensuring secrets are available at activation time with correct permissions.
  • MCP Server Integration: Shows how to inject decrypted secrets as environment variables for tools like the MCP server, facilitating secure access for AI agents.
  • Use Case: A developer needs to store an API key for a new service. They can use this skill to encrypt the API key with sops, define it in their nix-darwin configuration, and ensure it's securely decrypted and made available to their application at runtime.

Quick Start

Encrypt the 'ANTHROPIC_API_KEY' in 'secrets/darwin.yaml' and configure it in the Nix module to be available as an environment variable for the MCP server.

Dependency Matrix

Required Modules

None required

Components

Standard package

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: secrets-management
Download link: https://github.com/aitchwhy/dotfiles/archive/main.zip#secrets-management

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository