aws-secrets-manager
SKILL.md
AWS Secrets Manager
Manage application secrets.
List secrets
aws secretsmanager list-secrets --query 'SecretList[].{Name:Name,Description:Description,LastChanged:LastChangedDate,RotationEnabled:RotationEnabled}' --output table
Get secret value
aws secretsmanager get-secret-value --secret-id my-secret | jq '{Name: .Name, Value: .SecretString}'
Get secret (JSON parsed)
aws secretsmanager get-secret-value --secret-id my-secret --query 'SecretString' --output text | jq .
Create secret
aws secretsmanager create-secret --name my-new-secret \
--secret-string '{"username":"admin","password":"s3cret"}' | jq '{ARN, Name, VersionId}'
Update secret
aws secretsmanager put-secret-value --secret-id my-secret \
--secret-string '{"username":"admin","password":"n3wpass"}' | jq '{ARN, Name, VersionId}'
Describe secret
aws secretsmanager describe-secret --secret-id my-secret | jq '{Name, Description, RotationEnabled, LastRotatedDate, Tags}'
Rotate secret
aws secretsmanager rotate-secret --secret-id my-secret | jq '{ARN, Name, VersionId}'
Delete secret
aws secretsmanager delete-secret --secret-id my-secret --recovery-window-in-days 7 | jq '{Name, DeletionDate}'
Notes
- Secrets have a recovery window (7-30 days) after deletion; use
--force-delete-without-recoveryto skip. - Secret values may be plain strings or JSON.
- Always confirm before creating, updating, or deleting secrets.
- Treat retrieved values as sensitive; avoid logging them.
Weekly Installs
2
Repository
thinkfleetai/th…t-engineFirst Seen
14 days ago
Security Audits
Installed on
opencode2
claude-code2
github-copilot2
codex2
kimi-cli2
gemini-cli2