<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: boltenv</title>
    <description>The latest articles on DEV Community by boltenv (@boltenv).</description>
    <link>https://dev.to/boltenv</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3906459%2F3ab34115-dc34-4191-923e-48e2923494c5.png</url>
      <title>DEV Community: boltenv</title>
      <link>https://dev.to/boltenv</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/boltenv"/>
    <language>en</language>
    <item>
      <title>Stop Slacking your secrets. Use GitHub instead.</title>
      <dc:creator>boltenv</dc:creator>
      <pubDate>Thu, 30 Apr 2026 16:30:59 +0000</pubDate>
      <link>https://dev.to/boltenv/stop-slacking-your-secrets-use-github-instead-5706</link>
      <guid>https://dev.to/boltenv/stop-slacking-your-secrets-use-github-instead-5706</guid>
      <description>&lt;p&gt;Three months ago a friend of mine onboarded a contractor.&lt;/p&gt;

&lt;p&gt;He DM'd him the &lt;code&gt;.env&lt;/code&gt;. Standard practice. Two days later the contractor pushed a debug log to a public repo with one of the keys still in it.&lt;/p&gt;

&lt;p&gt;They rotated. Customers didn't notice. But that file is still in his Slack archive. It's still in the contractor's Slack archive. It's still cached on two computers. It will still be there in five years.&lt;/p&gt;

&lt;p&gt;That's the &lt;code&gt;.env&lt;/code&gt; problem. Most teams "solve" it the same way:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Slack DM (plaintext forever, in two chat archives)&lt;/li&gt;
&lt;li&gt;Notion page (whoever can read the page can read prod)&lt;/li&gt;
&lt;li&gt;1Password vault item (works, but now you have a second ACL to maintain)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;.env.example&lt;/code&gt; with fake values (drifts in 48 hours)&lt;/li&gt;
&lt;li&gt;"I'll send it to you on Signal" (still plaintext on two phones)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I tried the existing tools. &lt;strong&gt;Doppler&lt;/strong&gt; is great if you're 50 people with a budget — $21/user/mo and a sales call. &lt;strong&gt;Infisical&lt;/strong&gt; is open-source but feels Kubernetes-shaped, built for DevOps teams. &lt;strong&gt;dotenvx&lt;/strong&gt; is sharp and the encryption-in-git story is clever, but you still have to share the encryption key out of band, and there's no team-revocation story.&lt;/p&gt;

&lt;p&gt;What I actually wanted: zero new accounts, zero new ACLs. &lt;strong&gt;If GitHub already says you can push to the repo, you should be able to pull the env.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So I built &lt;code&gt;boltenv&lt;/code&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  The pitch in one sentence
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Revoke a teammate's GitHub access. They lose env access. Done.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That's the whole thing. GitHub repo permissions are the access list. There's no parallel user system to keep in sync.&lt;/p&gt;




&lt;h2&gt;
  
  
  What the workflow looks like
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# You: push your .env (encrypted on YOUR machine, only ciphertext leaves)&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;npm i &lt;span class="nt"&gt;-g&lt;/span&gt; @boltenv.dev/cli
&lt;span class="nv"&gt;$ &lt;/span&gt;boltenv push
  ⚡ .env → org/app:development v1 &lt;span class="o"&gt;(&lt;/span&gt;12 vars, permanent&lt;span class="o"&gt;)&lt;/span&gt;

&lt;span class="c"&gt;# Teammate: pull it&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;boltenv pull
  ⚡ .env ← org/app:development &lt;span class="o"&gt;(&lt;/span&gt;12 vars&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's it. No invites. No ACL panel. No "create a project."&lt;/p&gt;

&lt;p&gt;The first push generates an AES-256 key locally. The server only ever sees ciphertext. You share the key with your teammate once via secure channel:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# You&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;boltenv key &lt;span class="nb"&gt;export
&lt;/span&gt;dGhpcyBpcyBhIDMyIGJ5dGUga2V5...

&lt;span class="c"&gt;# Teammate&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;boltenv key import dGhpcyBpcyBhIDMyIGJ5dGUga2V5...
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After that, your teammate just runs &lt;code&gt;boltenv pull&lt;/code&gt; from any machine. They authenticate to GitHub once via Device Flow — same UX as &lt;code&gt;gh auth login&lt;/code&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  How it actually works
&lt;/h2&gt;

&lt;p&gt;Three layers, each independently breakable so the system fails closed:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Authorization gate
&lt;/h3&gt;

&lt;p&gt;Server calls &lt;code&gt;GET https://api.github.com/repos/{owner}/{repo}&lt;/code&gt; with the user's GitHub token. Reads &lt;code&gt;permissions.push&lt;/code&gt;. Read-only or no access → request rejected before any data moves. The server has no idea who's "on the team." It asks GitHub.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Encryption gate
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;AES-256-GCM (NIST standard)&lt;/li&gt;
&lt;li&gt;Key derivation: HKDF-SHA256, separate subkeys for encryption and HMAC&lt;/li&gt;
&lt;li&gt;IV: 12 bytes, random per push&lt;/li&gt;
&lt;li&gt;Auth tag: 16 bytes (tamper detection)&lt;/li&gt;
&lt;li&gt;Master key never leaves your laptop. Stored at &lt;code&gt;~/.boltenv/keys/{owner}/{repo}.key&lt;/code&gt; with mode &lt;code&gt;0600&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Server stores ciphertext + a 16-char key fingerprint so mismatched keys are caught early instead of producing garbled output.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Branch-aware environments
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight conf"&gt;&lt;code&gt;&lt;span class="n"&gt;main&lt;/span&gt;, &lt;span class="n"&gt;master&lt;/span&gt;  → &lt;span class="n"&gt;production&lt;/span&gt;
&lt;span class="n"&gt;staging&lt;/span&gt;       → &lt;span class="n"&gt;staging&lt;/span&gt;
&lt;span class="n"&gt;develop&lt;/span&gt;       → &lt;span class="n"&gt;development&lt;/span&gt;
&lt;span class="n"&gt;anything&lt;/span&gt; &lt;span class="n"&gt;else&lt;/span&gt; → &lt;span class="n"&gt;development&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The branch you're on determines what you push or pull. Override with &lt;code&gt;-e production&lt;/code&gt; if you need to. No "which environment is this dropdown set to" footgun.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why "GitHub permissions = ACL" matters
&lt;/h2&gt;

&lt;p&gt;Think about what happens today when someone leaves your team:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;✅ You remove them from GitHub.&lt;/li&gt;
&lt;li&gt;❌ You remove them from your Doppler / Infisical / Vault. (manual, often forgotten)&lt;/li&gt;
&lt;li&gt;❌ You rotate every secret they had access to. (rarely happens)&lt;/li&gt;
&lt;li&gt;❌ Their &lt;code&gt;.env&lt;/code&gt; files in &lt;code&gt;~/projects/*&lt;/code&gt; are now museum pieces of your prod stack.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With boltenv, &lt;strong&gt;step 1 is the whole list.&lt;/strong&gt; You revoke GitHub access — they can't pull anymore. Their cached &lt;code&gt;.env&lt;/code&gt; on disk is still there, sure (no tool can fix that), but they can't get a fresh one and they can't push poison.&lt;/p&gt;

&lt;p&gt;This isn't a perfect security model. It's a pragmatic one for small teams. If you're handling HIPAA data, go use Vault. If you're five people shipping a SaaS, this is the right level of control.&lt;/p&gt;




&lt;h2&gt;
  
  
  How it stacks up
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;Per-user cost&lt;/th&gt;
&lt;th&gt;New accounts?&lt;/th&gt;
&lt;th&gt;Encryption&lt;/th&gt;
&lt;th&gt;ACL source&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Slack DMs&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Free&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;"I trust you"&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;dotenvx&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Free&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;AES-256 in git&lt;/td&gt;
&lt;td&gt;Manual key sharing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Doppler&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;$21/mo&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Server-managed&lt;/td&gt;
&lt;td&gt;Doppler users&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Infisical&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;$8/mo&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Server-managed&lt;/td&gt;
&lt;td&gt;Infisical users&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;1Password Dev&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;$7.99/mo bundled&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;1P-managed&lt;/td&gt;
&lt;td&gt;1Password users&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;boltenv&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Free for ≤3, then $4/mo&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;None&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Client-side AES-256-GCM&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;GitHub repo permissions&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The lane I'm aiming for is narrow but real: small teams who don't want a heavyweight platform, don't want to share keys out of band forever, and do want one ACL.&lt;/p&gt;




&lt;h2&gt;
  
  
  CI/CD works without a service account
&lt;/h2&gt;

&lt;p&gt;Two env vars on the box, no SDK to install:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;export &lt;/span&gt;&lt;span class="nv"&gt;BOLTENV_TOKEN&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nv"&gt;$GITHUB_TOKEN&lt;/span&gt;     &lt;span class="c"&gt;# any PAT with repo scope&lt;/span&gt;
&lt;span class="nb"&gt;export &lt;/span&gt;&lt;span class="nv"&gt;BOLTENV_KEY&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&amp;lt;base64-from-export&amp;gt;
boltenv pull &lt;span class="nt"&gt;-y&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;code&gt;BOLTENV_TOKEN&lt;/code&gt; works with &lt;code&gt;secrets.GITHUB_TOKEN&lt;/code&gt; in GitHub Actions. &lt;code&gt;BOLTENV_KEY&lt;/code&gt; is the master key, stored as a single repo secret. The binary is the SDK.&lt;/p&gt;

&lt;p&gt;A typical Actions step:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Pull env&lt;/span&gt;
  &lt;span class="na"&gt;env&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;BOLTENV_TOKEN&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;${{ secrets.GITHUB_TOKEN }}&lt;/span&gt;
    &lt;span class="na"&gt;BOLTENV_KEY&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;   &lt;span class="s"&gt;${{ secrets.BOLTENV_KEY }}&lt;/span&gt;
  &lt;span class="na"&gt;run&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;|&lt;/span&gt;
    &lt;span class="s"&gt;npm i -g @boltenv.dev/cli&lt;/span&gt;
    &lt;span class="s"&gt;boltenv pull -e production -y&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Multi-file projects
&lt;/h2&gt;

&lt;p&gt;Most real projects have more than one env file: &lt;code&gt;.env.backend&lt;/code&gt;, &lt;code&gt;.env.frontend&lt;/code&gt;, &lt;code&gt;.env.workers&lt;/code&gt;. boltenv discovers them automatically:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$ &lt;/span&gt;boltenv push
  ⚡ Found 3 &lt;span class="nb"&gt;env &lt;/span&gt;files:
     .env.backend         18 vars
     .env.frontend        9 vars
     .env.workers         6 vars

  3 files → org/app:development &lt;span class="o"&gt;(&lt;/span&gt;permanent&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Pull preserves the layout. Save the file list to &lt;code&gt;.boltenv.yaml&lt;/code&gt; and commit it — your teammates pull the same set without configuration drift.&lt;/p&gt;




&lt;h2&gt;
  
  
  What it doesn't do
&lt;/h2&gt;

&lt;p&gt;I'd rather be honest about scope.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;No org-level RBAC.&lt;/strong&gt; Your repo permissions are the rules.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No automated key rotation.&lt;/strong&gt; Rotating means everyone re-imports.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No HSM, no compliance certifications.&lt;/strong&gt; This is a pre-SOC2 product.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No native Coolify / Railway / Vercel sync yet.&lt;/strong&gt; On the roadmap. Today: &lt;code&gt;boltenv pull --stdout --format dotenv&lt;/code&gt; and paste, or run boltenv on the VPS itself with the env-var auth above.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If any of those are deal-breakers — you're not the user, and that's fine.&lt;/p&gt;




&lt;h2&gt;
  
  
  Try it
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm i &lt;span class="nt"&gt;-g&lt;/span&gt; @boltenv.dev/cli
&lt;span class="nb"&gt;cd &lt;/span&gt;your-project
boltenv push
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Repo: &lt;a href="https://github.com/boltenv/boltenv" rel="noopener noreferrer"&gt;github.com/boltenv/boltenv&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Site: &lt;a href="https://boltenv.dev" rel="noopener noreferrer"&gt;boltenv.dev&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;License: FSL-1.1-MIT (free for everyone, including commercial use, with non-compete)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I'd love to hear what breaks for you. Comment, file an issue, or DM me. I read every one.&lt;/p&gt;

&lt;p&gt;If this saved you from one Slack-DM'd &lt;code&gt;.env&lt;/code&gt;, that's the entire goal.&lt;/p&gt;

</description>
      <category>secrets</category>
      <category>webdev</category>
      <category>programming</category>
      <category>productivity</category>
    </item>
  </channel>
</rss>
