From secrets-manager-integrator
Integrates secrets managers (Vault, AWS/GCP/Azure) into apps/infra; generates policies, auth configs, rotation schedules, Kubernetes manifests, and retrieval code.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin secrets-manager-integratorThis skill is limited to using the following tools:
Integrate secrets management platforms (HashiCorp Vault, AWS Secrets Manager, GCP Secret Manager, Azure Key Vault) into applications and infrastructure. Generate authentication configurations, access policies, secret rotation schedules, and application code patterns for secure credential retrieval at runtime.
Guides designing secret storage, rotation, and credential management systems covering HashiCorp Vault patterns, AWS Secrets Manager, Azure Key Vault, and zero-knowledge architectures.
Guides secure secrets management using Vault, AWS Secrets Manager, Azure Key Vault, environment variables, rotation, scanning tools, and CI/CD security. For implementing storage, rotation, leak prevention, credentials review.
Implements secure secrets management in CI/CD pipelines using HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, and Google Secret Manager. Includes GitHub Actions and GitLab CI integration examples.
Share bugs, ideas, or general feedback.
Integrate secrets management platforms (HashiCorp Vault, AWS Secrets Manager, GCP Secret Manager, Azure Key Vault) into applications and infrastructure. Generate authentication configurations, access policies, secret rotation schedules, and application code patterns for secure credential retrieval at runtime.
vault, aws, gcloud, az)apps/myapp/prod/database)| Error | Cause | Solution |
|---|---|---|
permission denied on secret read | Policy does not grant access to the requested path | Update Vault policy or IAM policy to include the specific secret ARN/path |
Vault token expired | Authentication token TTL exceeded | Configure token renewal or use short-lived tokens with auto-renewal via Vault Agent |
Secret not found | Secret path/name incorrect or secret deleted | Verify the secret exists with vault kv get or aws secretsmanager describe-secret |
Rotation failed | Rotation function lacks permissions or target service unreachable | Check rotation function logs; verify it has permissions to update credentials on the target service |
Connection refused to Vault | Vault server down or network policy blocking access | Verify Vault is running and healthy; check network policies/firewalls between application and Vault |