vault
$ brew tap hashicorp/tap && brew install hashicorp/tap/vaultSecrets, identity, and pki from the terminal.
- vault fits infra well, especially for secrets, identity, and pki from the terminal.
- It is the official CLI from HashiCorp.
- Good for scripts and agents.
- Good fit for coding-agent workflows and repeatable scripts.
- Structured output is available for automation and parsing.
Vault guide
The official CLI from HashiCorp. Secrets, identity, and pki from the terminal. Supports structured output — good for scripts and agents.
Open CLI packages the install path, verify step, and safe-start workflow so this tool can move from “interesting CLI” to something you can actually use. It also integrates with skills.sh so each CLI comes with the right companion skills, not just a binary and a docs link.
When to apply
- secrets, identity, and pki from the terminal.
- You're on HashiCorp and want the official terminal experience.
- You need secrets.
- You need identity.
- You need pki.
Quick reference
brew tap hashicorp/tap && brew install hashicorp/tap/vaultvault --helpvault server -devOpen CLI × skills.sh
Open CLI integrates vault with the right skills.sh companions so you get the tool and the workflow together.
Security Best Practices
Recommended pairingOpen CLI recommends this skills.sh skill because it fits security workflows. Add safer defaults when a CLI touches secrets, auth, or sensitive systems.
$ npx skills add https://github.com/supercent-io/skills-template --skill security-best-practicesUse vault together with the Security Best Practices skills.sh skill. Start with inspection or dry-run commands, summarize any risk, and ask before actions with side effects.
Why this tool
- vault fits infra well, especially for secrets, identity, and pki from the terminal.
- It is the official CLI from HashiCorp.
- Good for scripts and agents.
Watch-outs
- Sign in before real work.
- Start with read-only or dry-run commands.
Example workflow
1. vault server -devSafe start
Install vault.
Run `vault --help` first.
Start with `vault server -dev`.
Authenticate vault before asking the agent to do real work.