- CLI with
set,list,delete,run,statuscommands - macOS Keychain provider (
securityCLI) - Linux Secret Service provider (
secret-toolCLI) - CI mode (read from env vars, scrub only)
- Transform stream scrubber with sliding window
- Native OS dialog for secret input (macOS
osascript) - TTY fallback input
- Signal forwarding and exit code preservation
- Unit and integration tests
- Windows support (Credential Manager via
cmdkey/ PowerShell) -
peekachu env— printexportstatements for shell eval -
peekachu exec— alias forrunwith simpler syntax - Dotenv-style
--env-fileflag to load secret names from a file - Better error messages and diagnostics
- Shell completions (bash, zsh, fish)
- 1Password provider (
opCLI) - Bitwarden provider (
bwCLI) - AWS Secrets Manager provider
- HashiCorp Vault provider
- Azure Key Vault provider
- GCP Secret Manager provider
- Provider auto-detection based on environment
-
peekachu init— interactive setup wizard -
peekachu check— verify all required secrets are available - Config file support (
.peekachurc/peekachu.config.ts) - Secret rotation helpers
- Audit logging (which secrets were accessed, when)
- MCP server — expose as a tool for AI agents
- VS Code extension
- GitHub Action
- Secret sharing between team members (encrypted)
- Temporary secret scoping (auto-expire)
- Not a full secrets manager — peekachu is a bridge between secrets managers and AI-assisted development. Use a proper secrets manager (1Password, Vault, AWS SM) for the source of truth.
- Not a replacement for
.env— peekachu complements.envworkflows by adding keychain storage and output scrubbing. - No secret syncing — peekachu is local-first. Use your secrets manager's sync features.