Skip to main content

secrets-management

Facilitates secure credential management in VS Code using SecretStorage API, ensuring safe token storage and lifecycle management.

Install this skill

or
0/100

Security score

The secrets-management skill was audited on Mar 1, 2026 and we found 47 security issues across 4 threat categories, including 6 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

medium line 163

Template literal with variable interpolation in command context

SourceSKILL.md
163`${SERVICE} API Key not configured. Set your API key to use ${FEATURE}.`,
high line 227

Template literal with variable interpolation in command context

SourceSKILL.md
227| Logging actual tokens | Use `console.log(\`Migrated \${name}\`)` without value |
medium line 312

Template literal with variable interpolation in command context

SourceSKILL.md
312secrets.push(`${config.envVar}=${value}`);
medium line 333

Template literal with variable interpolation in command context

SourceSKILL.md
333const section = `\n\n# Alex Secrets Export (auto-generated)\n${secrets.join('\n')}`;
medium line 337

Template literal with variable interpolation in command context

SourceSKILL.md
337`Exported ${secrets.length} secret(s) to .env`
medium line 14

Access to .env file

SourceSKILL.md
14- Detect secrets in .env files across workspace
medium line 25

Access to .env file

SourceSKILL.md
25- User mentions ".env file" or "environment variables" with secret context
low line 110

Access to .env file

SourceSKILL.md
110ENV1[.env file] -->|alex.migrateEnvSecrets| SS1[SecretStorage]
low line 113

Access to .env file

SourceSKILL.md
113SS2[SecretStorage] -->|alex.exportSecretsToEnv| ENV2[.env file]
medium line 120

Access to .env file

SourceSKILL.md
120| **Import** | `Alex: Migrate .env to Secrets` | Secure existing plaintext tokens |
medium line 121

Access to .env file

SourceSKILL.md
121| **Export** | `Alex: Export Secrets to .env` | Enable external tool access |
medium line 128

Access to .env file

SourceSKILL.md
128| **Copy** | `secretStorage.store(key, process.env.VAR)` | Non-destructive (env var remains) |
low line 174

Access to .env file

SourceSKILL.md
174vscode.env.openExternal(vscode.Uri.parse(GET_URL));
medium line 233

Access to .env file

SourceSKILL.md
233### .env File Detection & Migration
medium line 235

Access to .env file

SourceSKILL.md
235Alex can automatically detect secrets in `.env` files and offer secure migration:
low line 239

Access to .env file

SourceSKILL.md
239// Scan workspace for .env files (excludes .env.example, .env.template)
low line 240

Access to .env file

SourceSKILL.md
240const envFiles = await vscode.workspace.findFiles('**/.env*', '**/node_modules/**');
medium line 254

Access to .env file

SourceSKILL.md
2541. **Scan**: Find all `.env` files in workspace
medium line 262

Access to .env file

SourceSKILL.md
262- `Alex: Detect & Migrate .env Secrets` - Scan workspace for .env files
medium line 263

Access to .env file

SourceSKILL.md
263- `Alex: Export Secrets to .env` - Write SecretStorage tokens to .env for external tool access
medium line 264

Access to .env file

SourceSKILL.md
264- Quick action button in Welcome panel - "🔍 Detect .env Secrets"
low line 268

Access to .env file

SourceSKILL.md
268🔍 Found 3 potential secret(s) in .env files:
medium line 282

Access to .env file

SourceSKILL.md
282- ✅ Removes plaintext secrets from `.env` files
medium line 287

Access to .env file

SourceSKILL.md
287### Export Secrets to .env (External Tool Access)
medium line 293

Access to .env file

SourceSKILL.md
293- External tools (Replicate CLI, OpenAI CLI) need env vars or .env
low line 302

Access to .env file

SourceSKILL.md
302const envPath = path.join(workspaceFolder.uri.fsPath, '.env');
low line 322

Access to .env file

SourceSKILL.md
322// Read existing .env, replace Alex section
low line 337

Access to .env file

SourceSKILL.md
337`Exported ${secrets.length} secret(s) to .env`
low line 344

Access to .env file

SourceSKILL.md
344# Source the .env file in PowerShell
low line 345

Access to .env file

SourceSKILL.md
345if (Test-Path .env) {
low line 346

Access to .env file

SourceSKILL.md
346Get-Content .env | ForEach-Object {
medium line 357

Access to .env file

SourceSKILL.md
357- ⚠️ Exported .env contains plaintext secrets — add to `.gitignore`
medium line 360

Access to .env file

SourceSKILL.md
360- ✅ Non-destructive — preserves existing .env content
medium line 380

Access to .env file

SourceSKILL.md
380- [ ] Command: "Detect & Migrate .env Secrets"
medium line 381

Access to .env file

SourceSKILL.md
381- [ ] Command: "Export Secrets to .env"
medium line 383

Access to .env file

SourceSKILL.md
383- [ ] Quick pick: Review detected .env secrets
medium line 402

Access to .env file

SourceSKILL.md
402- [ ] Verify .env file detection and parsing
medium line 411

Access to .env file

SourceSKILL.md
411- "Detect secrets in my .env files"
medium line 412

Access to .env file

SourceSKILL.md
412- "Export my secrets to .env for script access"
medium line 417

Access to .env file

SourceSKILL.md
417- "How do I update my code after migrating .env secrets?"
high line 85

Prompting for password/secret input

SourceSKILL.md
85| **Password input** | Set `password: true` on input boxes |
high line 49

Access to system keychain/keyring

SourceSKILL.md
49| **macOS** | Keychain | Keychain Services |
high line 50

Access to system keychain/keyring

SourceSKILL.md
50| **Linux** | Secret Service API (libsecret) | OS keyring (GNOME/KDE) |
high line 283

Access to system keychain/keyring

SourceSKILL.md
283- ✅ OS-level encryption (Credential Manager, Keychain, Secret Service)
high line 399

Access to system keychain/keyring

SourceSKILL.md
399- [ ] Test on macOS (Keychain)
low line 188

External URL reference

SourceSKILL.md
188getUrl: 'https://service.example.com/account/tokens',
low line 436

External URL reference

SourceSKILL.md
436- [VS Code SecretStorage API](https://code.visualstudio.com/api/references/vscode-api#SecretStorage)
Scanned on Mar 1, 2026
View Security Dashboard