Keep secrets out of AI context.
Block credentials from AI context windows. Store secrets in encrypted backends. Protect MCP server configs. One command to set up, zero runtime dependencies.
npx secretless-ai initOpen source. Runs locally. secretless-ai 0.17.0.
The problem.
AI coding tools read your filesystem. That includes .env files, SSH keys, cloud credentials, and MCP server configs. Without protection, your secrets enter the context window on every interaction.
Without secretless
- xAI reads .env files with API keys.
- xCredentials sent to remote AI APIs.
- xSSH keys and cloud credentials exposed in context.
- xAI suggests hardcoded secrets in code.
With secretless
- Secret files blocked before AI reads them.
- Credentials never enter the context window.
- Bash commands that dump secrets are blocked.
- AI uses environment variable references instead.
How it works.
Secretless auto detects your AI tools, blocks secret access, stores credentials in encrypted backends, and injects them at runtime.
Detect
Scans your project for AI tool config files. Finds .claude/, .cursorrules, .aider.conf.yml, and more.
Configure
Installs tool specific protections. Hooks for Claude Code, instruction files for Cursor and Copilot, ignore patterns for Aider.
Store
Secrets go into encrypted backends: local AES-256-GCM, OS keychain, 1Password, Vault, or GCP Secret Manager. Never in .env files.
Inject
At runtime, secrets are injected into process memory as environment variables. AI sees the output but never the secret values.
Five storage backends.
Choose where secrets are stored. All backends encrypt at rest. Secrets exist only in the backend and get injected into process memory at runtime.
Local
Default
AES-256-GCM encrypted file on disk. No external dependencies. Works everywhere Node.js runs.
- Zero setup
- Single machine
- Filesystem auth
OS Keychain
macOS and Linux
macOS Keychain or Linux Secret Service. Hardware backed encryption on Apple Silicon. OS login auth.
- OS level encryption
- Device local sync
- OS login auth
1Password
Recommended for teams
Dedicated vault via the op CLI. Biometric unlock (Touch ID). Service accounts for CI/CD. Cross device sync.
- Biometric auth
- Cross device sync
- CI/CD via service accounts
HashiCorp Vault
Enterprise or self hosted
KV v2 secrets engine. Cross device and cross cluster sync. Vault token authentication. Namespace isolation.
- Cross cluster sync
- Vault token auth
- Namespace isolation
GCP Secret Manager
Google Cloud
Google Cloud Secret Manager with IAM integration. Auto versioned. Native to Cloud Run, GKE, and Cloud Functions.
- IAM integrated auth
- Automatic versioning
- Cloud native sync
$ npx secretless-ai backend set 1password
Backend set to 1password.
$ npx secretless-ai migrate --from local --to 1password
Migrating 4 secrets from local to 1password.
Done. All secrets migrated.Secret management.
Store, list, and inject secrets without exposing them to AI tools. Import from .env files or set them individually.
Store and list secrets
$ npx secretless-ai secret set STRIPE_KEY=sk_live_...
Stored STRIPE_KEY.
$ npx secretless-ai secret list
ANTHROPIC_API_KEY
OPENAI_API_KEY
STRIPE_KEY
DATABASE_URLInject at runtime
# Inject all secrets into a command
$ npx secretless-ai run -- npm test
# Inject only specific keys
$ npx secretless-ai run --only STRIPE_KEY -- npm start
# Import from existing .env files
$ npx secretless-ai import --detect
Found .env (4 secrets).
Found .env.local (2 secrets).
Imported 6 secrets.MCP secret protection.
Every MCP server config has plaintext API keys in JSON files. The LLM sees them. Secretless encrypts them.
Encrypt MCP secrets
$ npx secretless-ai protect-mcp
Secretless MCP protection.
Scanned 1 client.
+ claude-desktop/browserbase
BROWSERBASE_API_KEY (encrypted)
+ claude-desktop/github
GITHUB_PERSONAL_ACCESS_TOKEN (encrypted)
+ claude-desktop/stripe
STRIPE_SECRET_KEY (encrypted)
3 secrets encrypted across 3 servers.Before. Plaintext keys in JSON.
{
"mcpServers": {
"stripe": {
"command": "npx",
"args": ["-y", "@stripe/mcp"],
"env": {
"STRIPE_SECRET_KEY": "sk_live_51Hx..."
}
}
}
}After. Encrypted, injected at runtime.
{
"mcpServers": {
"stripe": {
"command": "secretless-mcp",
"args": ["npx", "-y", "@stripe/mcp"],
"env": {}
}
}
}Allowlist and custom rules.
A gitignore style .secretlessignore file suppresses known false positives. Custom deny rules add organization specific patterns. Both contain patterns, not secrets, so they are safe to commit.
secretless-rules.yml
# Block org specific environment variables
env:
- ACME_*
- INTERNAL_DB_*
# Block proprietary config files
files:
- "*.corp-secret"
- "internal-config.*"
# Block commands that access internal systems
bash:
- "curl*internal.corp.com*"
- "vault read*"Initialize rules
$ npx secretless-ai rules init- Glob patterns for env vars, files, and bash commands.
- Extends built in rules, does not replace them.
- Safe to commit. Contains patterns, not secrets.
Test and manage rules
Preview what deny rules a pattern generates before applying. List active rules to audit coverage.
$ npx secretless-ai rules test "ACME_*"
$ npx secretless-ai rules listAI safe guard.
When an AI tool tries to read a secret value, secretless detects the non interactive context and blocks output.
$ npx secretless-ai secret get STRIPE_KEY
secretless: Blocked.
Secret values cannot be read in non interactive contexts.
AI tools capture stdout, which would expose the secret in their context.
To inject secrets into a command:
npx secretless-ai run -- <command>Direct terminal access (a human at a real TTY) works normally. The guard detects non interactive execution, which is how AI tools run commands, and refuses to output secret values.
Credential scope discovery.
Credential permissions change over time as platforms evolve. Scope discovery detects when a credential's effective permissions expand beyond its baseline, catching privilege escalation before it becomes a breach.
Discover and monitor scope drift
# Discover current permissions, save baseline
$ npx secretless-ai scope discover MY_GCP_KEY
# Compare current permissions to saved baseline
$ npx secretless-ai scope check MY_GCP_KEY
# List all stored baselines
$ npx secretless-ai scope list
# Clear a baseline to re discover
$ npx secretless-ai scope reset MY_GCP_KEYSupported providers
- GCP. Service account key JSON via
testIamPermissions. - HashiCorp Vault. Token prefix detection via
capabilities-self. - AWS. Access key prefix detection via STS plus IAM introspection.
All providers use self inspection APIs. No additional permissions required.
Broker integration
Add scopeCheck: true to any broker policy rule. The broker blocks credential access if the scope has expanded beyond its saved baseline.
Credential broker and data loss prevention.
Runtime credential access control and AI transcript scanning. Detect leaked credentials in shell history and conversation logs.
Credential broker
secretless-ai brokerIdentity aware credential access control daemon. Enforces deny all policies so each credential is only accessible to authorized agents. Supports AIM identity verification, trust score constraints, and rate limiting.
$ npx secretless-ai broker start
$ npx secretless-ai broker status
$ npx secretless-ai broker stop- Deny all by default.
- Per credential policy rules.
- AIM identity plus trust score constraints.
Data loss prevention
secretless-ai scan / clean / watchScan AI tool transcripts, shell history, and conversation logs for leaked credentials. Redact findings in place or preview with dry run. Set up real time monitoring to catch leaks as they happen.
# Scan shell history for credentials
$ npx secretless-ai scan --history
# Redact credentials in shell history
$ npx secretless-ai clean-history
# Scan and redact AI transcripts
$ npx secretless-ai clean
$ npx secretless-ai clean --last
# Start real time transcript monitoring
$ npx secretless-ai watch start- Shell history scanning and redaction.
- AI transcript credential detection.
- Real time watch daemon with system daemon support.
- Dry run mode for safe preview.
Supported AI tools.
Six AI coding tools, each with the strongest protection method that tool exposes.
| Tool | Protection method | Strength |
|---|---|---|
| Claude Code | PreToolUse hook plus deny rules and instructions | Strongest |
| Cursor | .cursorrules instructions | Good |
| GitHub Copilot | .github/copilot-instructions.md | Good |
| Windsurf | .windsurfrules instructions | Good |
| Cline | .clinerules instructions | Good |
| Aider | .aiderignore patterns | Good |
Claude Code gets the strongest protection because it supports hooks. A shell script runs before every file read and blocks access at the tool level.
What gets blocked.
File patterns that should never enter AI context, plus runtime credential pattern detection from the open source @opena2a/credential-patterns catalog.
File patterns
- Environment files
.env, .env.*, .env.local, .env.production - Private keys
*.key, *.pem, *.p12, *.pfx, *.crt - Cloud credentials
.aws/credentials, .ssh/*, .docker/config.json - Package auth
.npmrc, .pypirc, .git-credentials - Infrastructure
*.tfstate, *.tfvars - Secret directories
secrets/, credentials/
Credential pattern families
- Anthropic API keys
- OpenAI keys (project and legacy)
- AWS access keys plus secret keys
- GitHub PATs (classic and fine grained)
- Slack tokens (bot, user, webhook)
- Google API keys plus OAuth secrets
- Stripe live and test keys
- SendGrid keys
- Supabase service and anon keys
- Azure keys plus connection strings
- GitLab tokens (personal, project, group)
- Twilio account SID plus auth token
- Mailgun API keys
- MongoDB connection URIs
- JWTs and bearer tokens
Plus more in the catalog. Versioned and shared with hackmyagent and opena2a-cli.
Git protection and continuous verification.
Pre commit and pre push hooks scan staged files for secrets before they enter git history. The verify command audits installed protections on demand.
$ npx secretless-ai hook install
Installed pre-commit hook.
$ npx secretless-ai hook status
Pre-commit hook: installed.
Patterns active across all credential families.$ npx secretless-ai verify
Auditing installed protections.
+ Claude Code hook present.
+ .cursorrules instructions present.
+ .secretlessignore loaded.
+ Pre-commit hook installed.
All protections verified.Wires into agent identity.
When the credential broker runs, every credential access is attributable to a cryptographically signed agent identity. Trust score and policy gates apply per agent.
Agent attribution
Every broker decision is logged against an AIM identity, not a process or shell.
Trust score gates
Policy rules can require a minimum trust score. Suspended or revoked agents lose credential access immediately.
Shared CLI surface
opena2a-cli exposes secretless protect, broker, and scan commands through a unified surface.
Get started in 30 seconds.
No signup. No configuration. One command auto detects your AI tools, installs the right protections, and stores secrets in an encrypted backend.
npx secretless-ai init