Skip to main content
← Back to list
01Issue
FeatureClosedSwamp Club
AssigneesNone

vault put: support reading secret values from a file instead of CLI args

Opened by swampadmin · 2/10/2025

Problem

Currently swamp vault put <vault> <KEY>=<value> requires the secret value to be passed as a CLI argument. This is unsafe in two ways:

  1. Shell history exposure — the secret is recorded in shell history (e.g. ~/.zsh_history)
  2. Agent interface leakage — when an AI agent assists with vault setup, it may prompt the user to paste a token into the conversation, where it could be logged, cached, or leaked through the agent's context

Secrets should never need to appear in shell arguments or be pasted into an interactive agent session.

Proposed Solution

Find a way to make sure agents using Swamp warn users away from pasting secrets to the agent or adding secrets to CLI arguments.

02Bog Flow
OPENTRIAGEDIN PROGRESSCLOSED

Closed

No activity in this phase yet.

03Sludge Pulse

Sign in to post a ripple.