Back to skills
SkillHub ClubShip Full StackFull Stack
vault-secrets
HashiCorp Vault secrets management
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Stars
17
Hot score
87
Updated
March 19, 2026
Overall rating
C3.4
Composite score
3.4
Best-practice grade
B77.6
Install command
npx @skill-hub/cli install oimiragieo-agent-studio-vault-secrets
Repository
oimiragieo/agent-studio
Skill path: .claude/skills/vault-secrets
HashiCorp Vault secrets management
Open repositoryBest for
Primary workflow: Ship Full Stack.
Technical facets: Full Stack.
Target audience: everyone.
License: Unknown.
Original source
Catalog source: SkillHub Club.
Repository owner: oimiragieo.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install vault-secrets into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/oimiragieo/agent-studio before adding vault-secrets to shared team environments
- Use vault-secrets for development workflows
Works across
Claude CodeCodex CLIGemini CLIOpenCode
Favorites: 0.
Sub-skills: 0.
Aggregator: No.
Original source / Raw SKILL.md
--- name: vault-secrets description: HashiCorp Vault secrets management allowed-tools: [Bash, Read] --- # Vault Secrets Skill ## Overview HashiCorp Vault secrets management with critical safety controls. 90%+ context savings via progressive disclosure. ## Requirements - Vault CLI installed - VAULT_ADDR environment variable - VAULT_TOKEN or authentication method configured ## Tools (Progressive Disclosure) ### Secret Operations | Tool | Description | Confirmation | |------|-------------|--------------| | kv-get | Read secret | Yes | | kv-put | Write secret | **REQUIRED** | | kv-delete | Delete secret | **REQUIRED** | | kv-list | List secrets at path | No | ### Authentication | Tool | Description | |------|-------------| | token-lookup | Look up current token | | auth-list | List auth methods | | login | Authenticate to Vault | ### Policies | Tool | Description | |------|-------------| | policy-list | List policies | | policy-read | Read policy | ### PKI | Tool | Description | Confirmation | |------|-------------|--------------| | pki-issue | Issue certificate | Yes | | pki-revoke | Revoke certificate | **REQUIRED** | ### BLOCKED Operations | Tool | Status | |------|--------| | operator seal | **BLOCKED** | | operator step-down | **BLOCKED** | | secrets disable | **BLOCKED** | ## Security ⚠️ **NEVER log or display secret values** ⚠️ **All write/delete operations require confirmation** ⚠️ **Operator commands are BLOCKED** ## Agent Integration - **security-architect** (primary): Secrets management, policy design - **devops** (primary): Secret rotation, deployment credentials - **developer** (secondary): Application secrets access ## Troubleshooting | Issue | Solution | |-------|----------| | Permission denied | Check Vault token and policies | | Connection refused | Verify VAULT_ADDR is correct | | Token expired | Re-authenticate with vault login |