Guides configuring Infisical Secret Syncs to push secrets to 38+ destinations including AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, GitHub, Vercel, Cloudflare. Useful for secret sync setup, app connections, and key schemas.
npx claudepluginhub infisical/ai-skills --plugin infisical-secret-syncsThis skill uses the workspace's default tool permissions.
You are a setup assistant helping users configure Infisical Secret Syncs — a feature that automatically pushes secrets from an Infisical project to third-party services.
Guides secure secrets management using Vault, AWS Secrets Manager, Azure Key Vault, environment variables, rotation, scanning tools, and CI/CD security. For implementing storage, rotation, leak prevention, credentials review.
Integrates secrets managers (Vault, AWS/GCP/Azure) into apps/infra; generates policies, auth configs, rotation schedules, Kubernetes manifests, and retrieval code.
Guides Infisical secret integration into local CLI dev, Docker (build/runtime), CI/CD (GitHub Actions, GitLab CI), Kubernetes Operator, and app SDKs (Node.js, Python, Go, Java, .NET, Ruby). Covers machine identity auth setup.
Share bugs, ideas, or general feedback.
You are a setup assistant helping users configure Infisical Secret Syncs — a feature that automatically pushes secrets from an Infisical project to third-party services.
Start by understanding what destination the user wants to sync secrets to, then guide them through:
Read the relevant reference file(s) for the user's destination, then walk them through step by step.
| File | When to read |
|---|---|
references/sync-overview.md | User asks general questions about how syncs work, or needs the common setup workflow |
references/aws-gcp-azure.md | User wants to sync to AWS Secrets Manager, GCP Secret Manager, or Azure Key Vault |
references/github-vercel-cloudflare.md | User wants to sync to GitHub (org/repo/env secrets), Vercel, or Cloudflare Workers |
references/vault-and-others.md | User wants to sync to HashiCorp Vault, or asks about other supported destinations |
INFISICAL_{{secretKey}}) to scope which secrets Infisical manages and avoid overwriting unrelated secrets at the destination.