Would you be open to the idea of adding a safe=False option to read_dotenv? The way it would work is similar to dotenv-safe for Node.js, i.e. require the existence of .env.example and make sure that each entry from the example contains a value in .env.