Minimalist setup for managing secrets locally

You do not need HashiCorp Vault on day one. You do need three non-negotiables: Git discipline, one trustworthy place on your Mac, and CI injection for anything shared.


1. The five-item stack

#PieceJob
1.gitignore + .env.exampleNo secrets in Git — guide
2gitleaks locallyCatch accidents before push
3PassStoreEncrypted workspace vault on macOS (Security)
4GitHub Actions secrets (or equivalent)CI never reads your laptop
5Rotation after doubtplaybookHistory cleaning ≠ un-steal

2. Daily flow

  1. Open workspace for today’s repo.
  2. Copy keys into one terminal tab or short-lived .env.
  3. Close tab / delete ephemeral file when done.

3. What you deliberately skip (for now)

  • Doppler/Vault until team audit demands it — local vs cloud.
  • SOPS until infra team owns key custody.
  • Shared .env in Slackforever skip.

4. When to add complexity

Signals:

  • >5 engineers sharing same dev keys without per-person creds.
  • SOC2 asks for audit on secret reads.
  • Kubernetes sprawl — see open source compared.

Related