Help us improve
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
Share bugs, ideas, or general feedback.
By danwag06
P2P encrypted secret sharing for agentic workflows. Send and receive secrets without exposing content to the agent.
npx claudepluginhub b-open-io/claude-plugins --plugin send-secretThis skill should be used when the user asks to "receive a secret", "get a shared secret", "download encrypted file", "fetch secret from link", "retrieve secret URL", "save this secret", "grab this secret", "get this file from URL", "download from trycloudflare", "get credentials from URL", "receive encrypted", "save secret to file", "fetch from this link", or provides a send-secret URL (URLs containing trycloudflare.com/s/ and
This skill should be used when the user asks to "send clipboard as secret", "share what I copied", "send my clipboard securely", "share copied text", "share my clipboard", "send what's in my clipboard", "share copied credentials", "send copied password", "share clipboard with teammate", "send-secret from clipboard", "pbpaste send secret", "securely send what I copied", "share my password securely", or wants to share clipboard contents without the agent seeing them. macOS only - uses pbpaste to pipe clipboard directly to send-secret CLI.
This skill should be used when the user asks to "send a secret file", "share a file securely", "share credentials file", "send API keys file", "share .env securely", "encrypt and share file", "send config to teammate", "share SSH key", "send private key file", "share certificate file", "share secrets.json", "share keyfile", "securely share file", "send secret to coworker", "share tokens file", "npx send-secret", "encrypted file sharing", "one-time link for file", "self-destructing file share", or needs to share any sensitive file via P2P encrypted link. The file is encrypted locally with AES-256-GCM and served via a one-time Cloudflare tunnel.
This skill should be used when the user asks to "share a secret", "send secret", "share credentials", "share password", "share securely", "encrypted sharing", "one-time secret link", "self-destructing message", "secure file transfer", or mentions "send-secret" without specifying file/clipboard/receive. Routes to the appropriate specialized skill based on context.
Share bugs, ideas, or general feedback.
Own this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimOwn this plugin?
Verify ownership to unlock analytics, metadata editing, and a verified badge.
Sign in to claimBased on adoption, maintenance, documentation, and repository signals. Not a security audit or endorsement.
Encrypted secrets manager for Claude Code sessions backed by a private Git repo
Securely share Claude Code session distillations and project memory over LAN or relay
Blocks secrets and PII before they reach the Anthropic API
Encrypt and decrypt data with various algorithms
Prevents sensitive data (secrets, PII) from reaching AI servers by scanning files before they are read into conversation
Sync Claude Code sessions across devices with encrypted cloud storage
Stop sharing secrets through Slack, email, and text messages.
P2P encrypted secret sharing. No servers. No accounts. No trust required.
Install • Why • Usage • Security • Support
Every day, developers share API keys, database credentials, and secrets through:
.env files in repos — we've all seen itThese secrets persist. They get indexed. They get breached.
send-secret creates a one-time, encrypted link that self-destructs after viewing.
$ echo "sk_live_abc123" | npx send-secret
npx. No dependencies to audit.npm i -g send-secret
Or use without installing:
npx send-secret
Share secrets directly from your editor:
ext install danwag06.send-secret
Or search "send-secret" in the VS Code extensions marketplace.
Right-click any file or selection → Send Secret → link copied to clipboard.
Use send-secret with Claude Code, Cursor, Codex, and other AI coding agents.
npx add-skill danwag06/send-secret
This installs skills that let AI agents help you share secrets without the agent ever seeing the secret content:
| Skill | Description |
|---|---|
send-secret-file | Send files by path (agent never reads content) |
receive-secret | Receive secrets to files (saves with -o, never displays) |
send-secret-clipboard | Share clipboard contents (macOS - agent never sees clipboard) |
The skills are designed so secrets never enter the agent's context:
send-secret ./file.json without reading the file-o flag to save, never displays in terminalpbpaste | send-secret bypasses agent context entirelyAsk your AI agent:
$ send-secret
Enter secret, press Enter, then Ctrl+D:
sk_live_abc123xyz
^D
○ Encrypting (18 B)
✔ Tunnel ready
╭ Share this link ─────────────────────────────────────────────────────────────╮
│ https://abc123.trycloudflare.com/s/x7k2m#key=9f86d081884c7d659a2feaa0c │
╰──────────────────────────────────────────────────────────────────────────────╯
Keep terminal open until received
Recipient can also run: npx send-secret -r <link>
◐ Waiting for receiver...
✔ Retrieved from 73.162.45.99
$ send-secret ./credentials.json
○ Encrypting credentials.json (4.2 KB)
✔ Tunnel ready
╭ Share this link ─────────────────────────────────────────────────────────────╮
│ https://abc123.trycloudflare.com/s/x7k2m#key=9f86d081884c7d659a2feaa0c │
╰──────────────────────────────────────────────────────────────────────────────╯
Keep terminal open until received
Recipient can also run: npx send-secret -r <link>
◐ Waiting for receiver...
✔ Retrieved from 73.162.45.99
$ cat .env | send-secret
$ echo "secret_token" | send-secret
$ pbpaste | send-secret
Set an expiration time for undelivered secrets:
$ send-secret -t 300 ./secret.txt # Expires in 5 minutes
$ send-secret --timeout 60 # Expires in 60 seconds
◐ Waiting for receiver... (expires in 4m 32s)
If the receiver doesn't retrieve the secret before the timeout, it's automatically deleted.
Share with multiple people using a single link:
$ send-secret -n 3 ./credentials.json # Allow 3 views
$ send-secret -n 5 -t 300 ./secret.txt # 5 views OR 5 minutes
◐ Waiting for receivers... (0/3)
✔ Retrieved (1/3) from 73.162.45.99
✔ Retrieved (2/3) from 98.45.123.12
✔ Retrieved (3/3) from 73.162.45.99 — All delivered