npx claudepluginhub spences10/claude-code-toolkit --plugin nopeekThis skill uses the workspace's default tool permissions.
Secure proxy between Claude Code and your secrets. Claude knows key names, never key values.
Manages environment variables securely to prevent secrets exposure in Claude sessions, terminals, logs, or git commits. Use for handling sensitive config in development workflows.
Extracts hardcoded secrets from CLAUDE.md, .mcp.json, and project config into gitignored .env file, wires SessionStart hook for auto-loading. Use for 'separate secrets' or 'extract API keys'.
Securely manages environment variables with Varlock CLI. Masks secrets in terminals, logs, traces, Claude context. Validates via .env.schema for API keys, credentials.
Share bugs, ideas, or general feedback.
Secure proxy between Claude Code and your secrets. Claude knows key names, never key values.
Every Bash tool output is sent to Anthropic's API and retained 30+ days. If a CLI prints a token, that token is stored on Anthropic's servers. nopeek prevents this.
All nopeek commands are safe inside Claude Code — they never output secret values, only key names.
npx nopeek init
Detects installed cloud CLIs (aws, hcloud, kubectl, etc.), checks their auth config, and migrates to profile-based auth where needed.
npx nopeek load .env
npx nopeek load .env --only DATABASE_URL,API_KEY
Injects values into the session via CLAUDE_ENV_FILE (when available) or outputs a source command. Only key names appear in output — never values.
npx nopeek set MY_API_KEY --from-env
npx nopeek set STRIPE_KEY --value "sk_live_..."
Stored keys auto-load on every Claude Code session via the SessionStart hook.
npx nopeek status
npx nopeek list
| Hook | Event | Purpose |
|---|---|---|
| session-load.sh | SessionStart | Loads stored keys + CLI profiles into CLAUDE_ENV_FILE |
| redact-output.sh | PreToolUse(Bash) | Wraps cloud CLI output through secret pattern redaction |
CLAUDE_ENV_FILE so they never appear in output at all.|, >, or < to avoid breaking complex command semantics.npx nopeek audit
Scans current directory for .env files containing secrets and checks .gitignore coverage.
Keys not loading on session start:
npx nopeek status — are keys stored?/plugin list/reload-pluginsCloud CLI still showing secrets:
npx nopeek load .env to make secrets available as env vars, then use $VAR_NAME in commands