secrets-management by aj-geddes/useful-ai-prompts
npx skills add https://github.com/aj-geddes/useful-ai-prompts --skill secrets-management部署和配置安全的密钥管理系统,以存储、轮换和审计您基础设施中敏感凭据、API 密钥和证书的访问。
最小工作示例:
# vault-config.hcl
storage "raft" {
path = "/vault/data"
node_id = "node1"
}
listener "tcp" {
address = "0.0.0.0:8200"
tls_cert_file = "/vault/config/vault.crt"
tls_key_file = "/vault/config/vault.key"
}
api_addr = "https://0.0.0.0:8200"
cluster_addr = "https://0.0.0.0:8201"
ui = true
references/ 目录下的详细实现:
| 指南 | 内容 |
|---|
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
| HashiCorp Vault 设置 | HashiCorp Vault 设置 |
| Vault Kubernetes 集成 | Vault Kubernetes 集成 |
| Vault 密钥配置 | Vault 密钥配置 |
| AWS Secrets Manager 配置 | AWS Secrets Manager 配置 |
| Kubernetes Secrets | Kubernetes Secrets |
每周安装数
106
代码仓库
GitHub 星标数
116
首次出现
2026年1月21日
安全审计
安装于
opencode89
gemini-cli87
codex85
cursor83
claude-code82
github-copilot75
Deploy and configure secure secrets management systems to store, rotate, and audit access to sensitive credentials, API keys, and certificates across your infrastructure.
Minimal working example:
# vault-config.hcl
storage "raft" {
path = "/vault/data"
node_id = "node1"
}
listener "tcp" {
address = "0.0.0.0:8200"
tls_cert_file = "/vault/config/vault.crt"
tls_key_file = "/vault/config/vault.key"
}
api_addr = "https://0.0.0.0:8200"
cluster_addr = "https://0.0.0.0:8201"
ui = true
Detailed implementations in the references/ directory:
| Guide | Contents |
|---|---|
| HashiCorp Vault Setup | HashiCorp Vault Setup |
| Vault Kubernetes Integration | Vault Kubernetes Integration |
| Vault Secret Configuration | Vault Secret Configuration |
| AWS Secrets Manager Configuration | AWS Secrets Manager Configuration |
| Kubernetes Secrets | Kubernetes Secrets |
Weekly Installs
106
Repository
GitHub Stars
116
First Seen
Jan 21, 2026
Security Audits
Gen Agent Trust HubPassSocketWarnSnykPass
Installed on
opencode89
gemini-cli87
codex85
cursor83
claude-code82
github-copilot75