✓ Verified 💻 Development ✓ Enhanced Data

Authy

Inject secrets into subprocesses via environment variables.

Rating
3.9 (134 reviews)
Downloads
802 downloads
Version
1.0.0

Overview

Inject secrets into subprocesses via environment variables.

Complete Documentation

View Source →

Authy — Secure Secret Injection

Inject secrets into subprocesses as environment variables. You never see, handle, or log secret values.

How It Works

Your token is run-only. You can discover secret names with authy list and inject them into subprocesses with authy run. You never see secret values directly.

Inject Secrets into a Command

bash
authy run --scope <policy> --uppercase --replace-dash '_' -- <command> [args...]

The --uppercase --replace-dash '_' flags turn secret names like db-host into env vars like DB_HOST.

Examples:

bash
authy run --scope deploy --uppercase --replace-dash '_' -- ./deploy.sh
authy run --scope backend --uppercase --replace-dash '_' -- node server.js
authy run --scope testing --uppercase --replace-dash '_' -- pytest

Discover Secret Names

bash
authy list --scope <policy> --json

Output: {"secrets":[{"name":"db-host","version":1,...}]}

Write Scripts That Use Secrets

Write code that reads environment variables, then run it with authy run:

bash
cat > task.sh << 'EOF'
#!/bin/bash
curl -H "Authorization: Bearer $API_KEY" https://api.example.com/data
EOF
chmod +x task.sh
authy run --scope my-scope --uppercase --replace-dash '_' -- ./task.sh

Error Codes

CodeMeaning
0Success
2Auth failed — check AUTHY_TOKEN / AUTHY_KEYFILE
3Secret or policy not found
4Access denied or run-only restriction
6Token invalid, expired, or revoked

Rules

  • Only use authy run and authy list — these are the only commands available to you
  • Never hardcode credentials — reference env vars, run via authy run
  • Never echo, print, or log env vars in subprocess scripts — secrets exist in memory only
  • Never redirect env vars to files — do not write $SECRET to disk
  • Use --scope to limit access to needed secrets only

Installation

Terminal bash

openclaw install authy
    
Copied!

💻Code Examples

authy run --scope <policy> --uppercase --replace-dash '_' -- <command> [args...]

authy-run---scope-policy---uppercase---replace-dash-----command-args.txt
The `--uppercase --replace-dash '_'` flags turn secret names like `db-host` into env vars like `DB_HOST`.

Examples:

authy list --scope <policy> --json

authy-list---scope-policy---json.txt
Output: `{"secrets":[{"name":"db-host","version":1,...}]}`

## Write Scripts That Use Secrets

Write code that reads environment variables, then run it with `authy run`:
example.sh
authy run --scope deploy --uppercase --replace-dash '_' -- ./deploy.sh
authy run --scope backend --uppercase --replace-dash '_' -- node server.js
authy run --scope testing --uppercase --replace-dash '_' -- pytest
example.sh
cat > task.sh << 'EOF'
#!/bin/bash
curl -H "Authorization: Bearer $API_KEY" https://api.example.com/data
EOF
chmod +x task.sh
authy run --scope my-scope --uppercase --replace-dash '_' -- ./task.sh

Tags

#ai_and-llms

Quick Info

Category Development
Model Claude 3.5
Complexity One-Click
Author eric8810
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
🧠

Ready to Install?

Get started with this skill in seconds

openclaw install authy