Agent Skills: Secrets Management

Implement secrets management with HashiCorp Vault, AWS Secrets Manager, or Kubernetes Secrets for secure credential storage and rotation.

UncategorizedID: aj-geddes/useful-ai-prompts/secrets-management

Install this agent skill to your local

pnpm dlx add-skill https://github.com/aj-geddes/useful-ai-prompts/tree/HEAD/skills/secrets-management

Skill Files

Browse the full folder contents for secrets-management.

Download Skill

Loading file tree…

skills/secrets-management/SKILL.md

Skill Metadata

Name
secrets-management
Description
>

Secrets Management

Table of Contents

Overview

Deploy and configure secure secrets management systems to store, rotate, and audit access to sensitive credentials, API keys, and certificates across your infrastructure.

When to Use

  • Database credentials management
  • API key and token storage
  • Certificate management
  • SSH key distribution
  • Credential rotation automation
  • Audit and compliance logging
  • Multi-environment secrets
  • Encryption key management

Quick Start

Minimal working example:

# vault-config.hcl
storage "raft" {
  path    = "/vault/data"
  node_id = "node1"
}

listener "tcp" {
  address       = "0.0.0.0:8200"
  tls_cert_file = "/vault/config/vault.crt"
  tls_key_file  = "/vault/config/vault.key"
}

api_addr     = "https://0.0.0.0:8200"
cluster_addr = "https://0.0.0.0:8201"

ui = true

Reference Guides

Detailed implementations in the references/ directory:

| Guide | Contents | |---|---| | HashiCorp Vault Setup | HashiCorp Vault Setup | | Vault Kubernetes Integration | Vault Kubernetes Integration | | Vault Secret Configuration | Vault Secret Configuration | | AWS Secrets Manager Configuration | AWS Secrets Manager Configuration | | Kubernetes Secrets | Kubernetes Secrets |

Best Practices

✅ DO

  • Rotate secrets regularly
  • Use strong encryption
  • Implement access controls
  • Audit secret access
  • Use managed services
  • Implement secret versioning
  • Encrypt secrets in transit
  • Use separate secrets per environment

❌ DON'T

  • Store secrets in code
  • Use weak encryption
  • Share secrets via email/chat
  • Commit secrets to version control
  • Use single master password
  • Log secret values
  • Hardcode credentials
  • Disable rotation