Loading...
Loading...
Enforce secure secrets management across all platforms. Never hardcode OAuth2 secrets, API keys, tokens, passwords, or credentials in source code. Store all secrets in .env files, load from environment variables, and ensure .env is gitignored. Use this skill when: (1) writing any code that uses API keys, OAuth2 client secrets, tokens, or credentials, (2) setting up authentication or third-party integrations, (3) creating new projects that need environment configuration, (4) reviewing code for security issues related to secrets, (5) configuring CI/CD pipelines or Docker deployments with secrets. Triggers: API key, OAuth, client secret, token, credentials, .env, environment variables, secret, password, authentication setup, third-party integration.
npx skill4agent add alfredang/skills secrets.envlocal.properties.xcconfig.env.gitignore.env.example.env.gitignoreprocess.env.*os.getenv().env.examplepython3 scripts/scan_secrets.py ..env.env.example.env.gitignore.envpython3 scripts/scan_secrets.py <project-directory>.gitignore.env.env.example.env# BAD - hardcoded secrets
api_key = "sk-1234567890abcdef"
client_secret = "my-oauth-secret"
DATABASE_URL = "postgres://user:password@host/db"
const token = "ghp_xxxxxxxxxxxxxxxxxxxx";# GOOD - loaded from environment
api_key = os.getenv("API_KEY")
const token = process.env.GITHUB_TOKEN;.xcconfig.envlocal.propertiesbuildConfigField.envflutter_dotenv.env