vault

SKILL.md

HashiCorp Vault

Secrets management and data protection platform.

When to Use

  • Centralized secrets management
  • Dynamic credentials
  • Encryption as a service
  • PKI/certificate management

Quick Start

# Start dev server
vault server -dev

# Set address
export VAULT_ADDR='http://127.0.0.1:8200'

# Store secret
vault kv put secret/myapp username=admin password=secret

# Read secret
vault kv get secret/myapp

Core Concepts

API Access

import vault from "node-vault";

const client = vault({
  apiVersion: "v1",
  endpoint: process.env.VAULT_ADDR,
  token: process.env.VAULT_TOKEN,
});

// Read secret
const { data } = await client.read("secret/data/myapp");
console.log(data.data.password);

// Write secret
await client.write("secret/data/myapp", {
  data: { username: "admin", password: "new-secret" },
});

Dynamic Secrets

# Enable database engine
vault secrets enable database

# Configure connection
vault write database/config/mydb \
  plugin_name=mysql-database-plugin \
  connection_url="{{username}}:{{password}}@tcp(localhost:3306)/"

# Get dynamic credentials
vault read database/creds/my-role

Best Practices

Do: Use AppRole for apps, enable audit logging, rotate tokens Don't: Use root token in production, store vault token in code

References

Weekly Installs
2
GitHub Stars
7
First Seen
Feb 10, 2026
Installed on
mcpjam2
claude-code2
replit2
junie2
windsurf2
zencoder2