Skip to content

Add secretctl - AI-safe secrets manager with MCP integration #465

@forest6511

Description

@forest6511

Resource Recommendation

Name: secretctl

URL: https://github.com/forest6511/secretctl

Category Suggestion: Tooling 🧰 > General (or a new "Security" subcategory if appropriate)

Description:
Local-first secrets manager with built-in MCP server. Allows Claude Code to run commands with credentials injected as environment variables, without ever exposing plaintext secrets to the AI agent.

Key Features:

  • MCP tools: secret_list, secret_run, secret_get_masked, secret_run_with_bindings
  • Output sanitization (secrets in stdout are automatically redacted)
  • AES-256-GCM encryption with Argon2id key derivation
  • Single binary, no cloud dependency

Why it's useful for Claude Code users:
Instead of pasting API keys into Claude Code conversations, users can:

secretctl set aws --field access_key=AKIA... --field secret_key=...
# Claude calls secret_run via MCP - gets command output, never sees credentials

This follows the "Access Without Exposure" philosophy used by 1Password and HashiCorp Vault.

License: Apache 2.0

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions