secrets-manager
Audited by Socket on Mar 3, 2026
1 alert found:
SecurityThe fragment describes a coherent secrets-management tool aligned with its purpose, but introduces notable security and supply-chain concerns: Git-based installation (higher supply-chain risk), plaintext import/export paths (plaintext exposure risk), and environment-injection of secrets into subprocesses (potential leakage). Recommend tightening: pin dependencies/commits, document key management policies (rotation, revocation), restrict and audit MCP access, ensure authenticated and authorized communications, and minimize plaintext exposure by avoiding or securing export/import workflows and enforcing least-privilege access. Overall, treat as high-risk and in need of strong operational controls and provenance guarantees.