From hashicorp-vault
Use this skill when the user asks to "manage auth methods", "create a policy", "manage tokens", "enable LDAP", "set up approle", "create an ACL policy", "revoke a token", "list policies", or any task involving Vault authentication and authorization.
npx claudepluginhub pzharyuk/ai-claude-plugins --plugin hashicorp-vaultThis skill uses the workspace's default tool permissions.
Use the `hashicorp-vault` MCP server tools to manage authentication methods, ACL policies, and tokens.
Prevents silent decimal mismatch bugs in EVM ERC-20 tokens via runtime decimals lookup, chain-aware caching, bridged-token handling, and normalization. For DeFi bots, dashboards using Python/Web3, TypeScript/ethers, Solidity.
Share bugs, ideas, or general feedback.
Use the hashicorp-vault MCP server tools to manage authentication methods, ACL policies, and tokens.
Call vault_list_auth to see all enabled auth methods with their types and paths.
userpass, approle, ldap, oidc, kubernetes, jwt, cert, github, etc.vault_enable_auth with a path and type.vault_disable_auth.Call vault_list_policies to see all ACL policy names.
Call vault_read_policy with the policy name to view the HCL rules.
path "secret/data/myapp/*" {
capabilities = ["create", "read", "update", "delete", "list"]
}
path "secret/metadata/myapp/*" {
capabilities = ["list", "read"]
}
vault_write_policy with the name and policy document.vault_delete_policy.Call vault_create_token with policies, TTL, and other options. Common patterns:
policies: ["myapp-read"], ttl: "24h", renewable: truenum_uses: 1, ttl: "5m"no_parent: true (won't be revoked when parent is)vault_lookup_self — info about the current tokenvault_lookup_token — info about a specific tokenCall vault_renew_token before the TTL expires. Only works if the token is renewable.
Call vault_revoke_token — this also revokes all child tokens.
approle for machine-to-machine auth, oidc for humans.See references/policy-syntax.md for HCL policy syntax details.