Secrets without the server.
Cloud-provider secret manager CLI with Doppler/Infisical-grade developer experience.
Docs · Install · Quick start · Community · Getting started
skret run -- make up-prod # Inject secrets from AWS SSM into a command
skret import --from=doppler # Migrate from Doppler
skret sync --to=github # Push secrets to GitHub Actions- Why skret?
- Features
- Install
- Quick start
- Provider ranking
- Comparison vs alternatives
- Documentation
- Command overview
- Contributing
- Sponsors
- Acknowledgments
- License
CLI wrappers that inject cloud secrets into a run -- cmd invocation already exist — teller, novops, summon, and a long tail of single-backend tools like chamber. What was missing for our use case was a single binary that combines:
- Migration importers for Doppler, Infisical, and
.env— so a team can leave a paid SaaS without rewriting deploy pipelines. - CI/CD sync that pushes the same secret set to GitHub Actions in one command, with hash-based drift detection.
- Production-grade release artifacts — cosign signatures, SBOMs, reproducible builds — so the binary itself can sit on a build agent without separate hardening.
- Doppler-grade DX (
skret run -- your-cmd) on top of cloud-native IAM, no self-hosted control plane, no per-seat licence.
If you only need a single-cloud injector and you don't care about migration or CI sync, teller or summon may already be enough — see the comparison table for the honest trade-offs.
- Multi-provider backend: AWS SSM Parameter Store today; OCI Vault, Azure Key Vault, GCP Secret Manager on the roadmap. Switch backends with one config line.
- Zero-server architecture: Direct cloud IAM. No self-hosted control plane, no license fees, no new billing surface.
- Doppler-grade CLI:
skret run -- your-cmdinjects secrets as env vars. Identical UX todoppler run --. - Migration-first: Built-in importers for Doppler, Infisical, and
.envfiles. - CI/CD syncers: Push secrets to GitHub Actions repository secrets in one command.
- Production-grade: 93%+ test coverage, CodeQL security scanning, SBOM + cosign-signed release artifacts.
- Cross-platform: Linux, macOS, Windows — amd64 and arm64 binaries for each.
| Platform | One-shot script | Package manager |
|---|---|---|
| macOS / Linux | curl -fsSL https://skret.n24q02m.com/install.sh | sh |
brew install n24q02m/tap/skret |
| Windows | iwr -useb https://skret.n24q02m.com/install.ps1 | iex |
scoop bucket add n24q02m https://github.com/n24q02m/scoop-bucket && scoop install skret |
| Cross-OS managers | mise use -g aqua:n24q02m/skret@latest |
nix shell github:n24q02m/skret-nix#skret |
| Go developers | go install github.com/n24q02m/skret/cmd/skret@latest |
— |
| Direct binary | Download from Releases | — |
Verify the install and check the version:
skret --versionThe install.sh and install.ps1 scripts verify SHA256 checksums and (if cosign is available) the Sigstore signature before placing the binary. Source both scripts at skret.n24q02m.com/install.sh and skret.n24q02m.com/install.ps1 before piping to a shell if you prefer — both are short, POSIX-pure or PowerShell 5+.
# 1. Initialise .skret.yaml in your repo
skret init --provider=aws --path=/myapp/prod --region=ap-southeast-1
# 2. (Optional) Import existing secrets from Doppler
export DOPPLER_TOKEN=dp.pt.xxx
skret import --from=doppler \
--doppler-project=myapp --doppler-config=prd \
--to-path=/myapp/prod
# 3. Run your app with secrets injected
skret run -- make up-prod
# 4. Sync to GitHub Actions for CI/CD
export GITHUB_TOKEN=ghp_xxx
skret sync --to=github \
--github-repo=myorg/myapp --from-env=prod
# 5. Re-sync, skip secrets that haven't changed since the last successful run
skret sync --to=github --github-repo=myorg/myapp --skip-unchangedSee Getting started for the 5-minute guided tour.
Cost figures below use a representative scale: 17 repos × 340 secrets × 30,000 reads/month, ap-southeast-1 (Singapore).
| Rank | Backend | Monthly cost | Recommended for |
|---|---|---|---|
| 1 | AWS SSM Parameter Store (Standard) | $0 | Default — AWS-native or mixed-cloud |
| 2 | OCI Vault (software-protected) | $0 | Users with OCI tenancy; best rotation lifecycle |
| 3 | Azure Key Vault (Standard) | ~$0.09 | Azure-native or multi-cloud DR |
| 4 | GCP Secret Manager | ~$20 | GCP-native workloads |
| 5 | AWS Secrets Manager | ~$136 | Only when managed rotation (RDS/Redshift) is required |
See provider comparison for the full feature matrix.
Audited 2026-05-01 against the latest release of each tool. The comparison covers three SaaS / self-host secret managers (Doppler, Infisical, Bitwarden Secrets Manager) and three OSS CLI wrappers in skret's design space (teller, novops, summon).
| Feature | skret | Doppler | Infisical | Bitwarden SM | teller | novops | summon |
|---|---|---|---|---|---|---|---|
| Type | OSS CLI | SaaS | SaaS / self-host | SaaS / self-host | OSS CLI | OSS CLI | OSS CLI |
| Language | Go 1.26 | proprietary | TypeScript | Rust | Rust | Rust | Go |
| Licence | MIT | proprietary | MIT (complex) | GPL-3.0 (CLI) | Apache-2.0 | LGPL-3.0 | MIT |
| Server / control plane | none | none (SaaS) | container + Postgres | none (SaaS) | none | none | none |
| Free tier ceiling (10 devs, 17 repos) | unlimited (cloud cost only) | 5 projects, then $7/seat | self-host or $7/seat | 3 projects, then $6/seat (Teams) | unlimited | unlimited | unlimited |
| Cloud secret-store backends | AWS SSM today; OCI Vault, Azure KV, GCP SM on roadmap | own store | own store | own store | AWS SM, AWS SSM, GCP SM, Vault, Consul, dotenv | AWS SM/SSM, GCP SM, Azure KV, Vault, SOPS, Bitwarden | Conjur, AWS, keyring (provider plugin) |
run -- cmd injection |
yes | yes | yes | yes | yes | yes (run and load) |
yes |
| Importer for Doppler / Infisical / .env | all three built-in | n/a | partial (one-way) | none | dotenv only | none (Infisical on roadmap) | none |
| Sync to GitHub Actions secrets | built-in (skret sync --to=github; --skip-unchanged for hash-based drift detection) |
via paid integration | via paid integration | none | none | none | none |
| Release-artifact provenance | cosign + SBOM + reproducible | n/a (SaaS) | n/a (SaaS) | n/a (SaaS) | none | none | none |
| Cost at our scale (17 repos × 340 secrets × 30k reads/mo, AWS SSM Standard) | $0 | $84 / mo (10 seats) | ~$30 / mo infra (self-host) | $60 / mo (10 seats, Teams) | $0 | $0 | $0 |
| Latest release (audit 2026-05-01) | rolling, semantic-release | rolling SaaS | rolling SaaS | rolling SaaS | v2.0.7, May 2024 (12 mo gap) | v0.20.1, Jun 2025 (10 mo gap) | v0.11.0, Mar 2026 |
How to read this:
- If you want a managed UX and you're happy paying per seat, Doppler still has the best DX in this space.
- If you want self-host SaaS with K8s-native operators and a web UI, Infisical is the right pick — accept the Postgres + container ops cost.
- If you only need a single-cloud
run -- cmdinjector and don't care about migration / CI sync, summon (most actively maintained) or novops (broadest backend list) is enough — and shorter than skret. - skret's wedge is the combination: cloud-native backend ranking + migration importers + GitHub Actions sync + signed release artifacts in one binary. If two or more of those matter to you, skret is meant to replace the patchwork.
Full docs at skret.n24q02m.com:
- Getting started — 5-minute tutorial
- Installation — every platform, every method
- Configuration —
.skret.yamlreference - Authentication — AWS SSO, OIDC, IAM
- Provider comparison — cost + features across AWS, OCI, Azure, GCP
- Migrate from Doppler
- Migrate from Infisical
- Makefile patterns
- Troubleshooting
- FAQ
| Command | Purpose |
|---|---|
skret init |
Create .skret.yaml in the current repo |
skret run -- <cmd> |
Inject secrets as env vars and exec a command |
skret get <KEY> |
Print a single secret value |
skret env |
Dump all secrets in dotenv / JSON / YAML / export format |
skret set <KEY> <VALUE> |
Create or update a secret |
skret delete <KEY> |
Delete a secret |
skret list |
List secrets under the current environment path |
skret import --from=<source> |
Import from Doppler, Infisical, dotenv |
skret sync --to=<target> |
Sync to GitHub Actions, dotenv |
See CONTRIBUTING.md and the contributing guide.
git clone https://github.com/n24q02m/skret
cd skret
mise install # Installs Go 1.26+, pnpm, golangci-lint
pre-commit install
go test -race ./...Sister projects from n24q02m (click to expand)
| Project | Tagline | Tag |
|---|---|---|
| better-code-review-graph | Knowledge graph for token-efficient code reviews -- fixed search, configurabl... | MCP |
| better-email-mcp | IMAP/SMTP email server for AI agents -- 6 composite tools with multi-account ... | MCP |
| better-godot-mcp | Composite MCP server for Godot Engine -- 17 mega-tools for AI-assisted game d... | MCP |
| better-notion-mcp | Markdown-first Notion API server for AI agents -- 10 composite tools replacin... | MCP |
| better-telegram-mcp | MCP server for Telegram with dual-mode support: Bot API (httpx) for quick bot... | MCP |
| claude-plugins | Full documentation: mcp.n24q02m.com — unified docs for all 8 servers + the mc... | Marketplace |
| imagine-mcp | Production-grade MCP server for image and video understanding + generation ac... | MCP |
| jules-task-archiver | Chrome Extension for bulk operations on Jules tasks via batchexecute API -- a... | Tooling |
| mcp-core | Unified MCP Streamable HTTP 2025-11-25 transport, OAuth 2.1 Authorization Ser... | MCP |
| mnemo-mcp | Persistent AI memory with hybrid search and embedded sync. Open, free, unlimi... | MCP |
| qwen3-embed | Lightweight Qwen3 text embedding and reranking via ONNX Runtime and GGUF | Library |
| skret | Secrets without the server. | CLI |
| web-core | Shared web infrastructure package for search, scraping, HTTP security, and st... | Library |
| wet-mcp | Open-source MCP Server for web search, content extraction, library docs & mul... | MCP |
If skret saves your team the Doppler seat cost or the Infisical ops overhead, please consider sponsoring continued development.
skret was inspired by Doppler and Infisical — teams who made CLI-first secrets management pleasant — and by the OSS injection-wrapper lineage of teller, novops, summon, and chamber. It is built on AWS SDK for Go v2, Cobra, and documented with Astro Starlight on Cloudflare Pages.
Report vulnerabilities privately — see SECURITY.md.
MIT © n24q02m
