| packages/nixpkgs/gnome-secrets | Password manager for GNOME which makes use of the KeePass v.4 format |
| packages/nixpkgs/git-secrets | Prevents you from committing secrets and credentials into git repositories |
| packages/nixpkgs/tell-me-your-secrets | Tools to find secrets from various signatures |
| packages/nixpkgs/detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/secrets-extractor | Tool to check packets for secrets |
| packages/nixpkgs/emacsPackages.hide-secrets | |
| packages/nixpkgs/haskellPackages.aws-secrets | Fetch data from AWS Secrets Manager |
| packages/nixpkgs/kubernetes-helmPlugins.helm-secrets | Helm plugin that helps manage secrets |
| packages/nixpkgs/python313Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python314Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python313Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/python314Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/secretspec | Declarative secrets, every environment, any provider |
| packages/nixpkgs/python312Packages.detect-secrets | Enterprise friendly way of detecting and preventing secrets in code |
| packages/nixpkgs/python312Packages.bc-detect-secrets | Tool to detect secrets in the code |
| packages/nixpkgs/badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-secrets | Azure Security Keyvault Secrets Package client library for C++ |
| packages/nixpkgs/ripsecrets | Command-line tool to prevent committing secret keys into your source code |
| packages/nixpkgs/python313Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/python312Packages.azure-keyvault-secrets | Microsoft Azure Key Vault Secrets Client Library for Python |
| packages/nixpkgs/secretscanner | Tool to find secrets and passwords in container images and file systems |
| packages/nixpkgs/deepsecrets | Secrets scanner that understands code |
| packages/nixpkgs/python313Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/python314Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/python314Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python313Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python312Packages.badsecrets | Module for detecting known secrets across many web frameworks |
| packages/nixpkgs/python312Packages.secretstorage | Python bindings to FreeDesktop.org Secret Service API |
| packages/nixpkgs/python313Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/python314Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/haskellPackages.amazonka-secretsmanager | Amazon Secrets Manager SDK |
| packages/nixpkgs/python313Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/python314Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/python313Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/python314Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/python312Packages.mypy-boto3-secretsmanager | Type annotations for boto3 secretsmanager |
| packages/nixpkgs/python312Packages.aws-secretsmanager-caching | Client-side AWS secrets manager caching library |
| packages/nixpkgs/python312Packages.pysecretsocks | Socks server for tunneling a connection over another channel |
| packages/nixpkgs/rPackages.ropensecretsapi | |
| packages/nixpkgs/haskellPackages.stratosphere-secretsmanager | Stratosphere integration for AWS SecretsManager |
| packages/nixpkgs/python314Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| packages/nixpkgs/python313Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| packages/nixpkgs/python312Packages.types-aiobotocore-secretsmanager | Type annotations for aiobotocore secretsmanager |
| options/nixos/boot.initrd.secrets | Secrets to append to the initrd
|
| options/nixos/services.maddy.secrets | A list of files containing the various secrets
|
| options/nixos/services.peertube.secrets.secretsFile | Secrets to run PeerTube
|
| options/nixos/services.eintopf.secrets | A list of files containing the various secrets
|
| options/nixos/programs.nncp.secrets | A list of paths to NNCP configuration files that should not be
in the Nix store
|
| options/nixos/services.ddclient.secretsFile | A file containing the secrets for the dynamic DNS provider
|
| options/nixos/services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| options/nixos/networking.wireless.secretsFile | File consisting of lines of the form varname=value
to define variables for the wireless configuration
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/nixos/services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| options/nixos/services.firefox-syncserver.secrets | A file containing the various secrets
|
| options/nixos/services.immich.secretsFile | Path of a file with extra environment variables to be loaded from disk
|
| options/nixos/services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.nextcloud.secrets | Secret files to read into entries in config.php
|
| options/nixos/services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| options/nixos/services.kubernetes.secretsPath | Default location for kubernetes secrets
|
| options/nixos/services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.librespeed.secrets | Attribute set of filesystem paths
|
| options/nixos/services.strongswan.secrets | A list of paths to IPSec secret files
|
| options/nixos/services.draupnir.secrets.accessToken | File containing the access token for Draupnir's Matrix account
to be used in place of services.draupnir.settings.accessToken.
|
| options/nixos/services.pfix-srsd.secretsFile | The secret data used to encode the SRS address.
to generate, use a command like:
for n in $(seq 5); do dd if=/dev/urandom count=1 bs=1024 status=none | sha256sum | sed 's/ -$//' | sed 's/^/ /'; done
|
| options/nixos/services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| options/nixos/services.postsrsd.secretsFile | Secret keys used for signing and verification.
The secret will be generated, if it does not exist at the given path.
|
| options/nixos/services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| options/nixos/services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap | EAP secret section for a specific secret
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.gitlab.secrets.activeRecordSaltFile | A file containing the salt for active record encryption in the DB
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm | NTLM secret section for a specific secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth | EAP secret section for a specific secret
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/nixos/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| options/darwin/services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| packages/nixpkgs/ks | Command-line secrets manager powered by macOS keychains |
| options/nixos/services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa | Private key decryption passphrase for a key in the rsa
folder.
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk | Postquantum Preshared Key (PPK) section for a specific secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike | IKE preshared secret section for a specific secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa | Private key decryption passphrase for a key in the
ecdsa folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token | Definition for a private key that's stored on a token/smartcard/TPM.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8 | Private key decryption passphrase for a key in the
pkcs8 folder.
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12 | PKCS#12 decryption passphrase for a container in the
pkcs12 folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private | Private key decryption passphrase for a key in the
private folder.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries | A list of secrets to provide to NetworkManager by reading their values from configured files
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| options/nixos/services.bitwarden-directory-connector-cli.secrets.ldap | Path to file that contains LDAP password for user in {option}`ldap.username
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret | Value of the IKE preshared secret
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.draupnir.secrets.pantalaimon.password | File containing the password for Draupnir's Matrix account when used in
conjunction with Pantalaimon to be used in place of
services.draupnir.settings.pantalaimon.password.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret | Value of the NTLM secret, which is the NT Hash of the actual secret,
that is, MD4(UTF-16LE(secret))
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/nixos/boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchSetting | name of the setting section for which secrets are requested
|
| options/nixos/services.gitlab.secrets.activeRecordDeterministicKeyFile | A file containing the secret used to encrypt some rails data in a deterministic way
in the DB
|
| packages/nixpkgs/bws | Bitwarden Secrets Manager CLI |
| options/nixos/services.draupnir.secrets.web.synapseHTTPAntispam.authorization | File containing the secret token when using the Synapse HTTP Antispam module
to be used in place of
services.draupnir.settings.web.synapseHTTPAntispam.authorization
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.package | The nm-file-secret-agent package to use.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.key | key in the setting section for which this entry provides a value
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.file | file from which the secret value is read
|
| options/nixos/services.bookstack.settings | Options for Bookstack configuration
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.trim | whether leading and trailing whitespace should be stripped from the files content before being passed to NetworkManager
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchIface | interface name of the NetworkManager connection
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchUuid | UUID of the connection profile
UUIDs are assigned once on connection creation and should never change as long as the connection still applies to the same network.
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchId | connection id used by NetworkManager
|
| options/nixos/networking.networkmanager.ensureProfiles.secrets.entries.*.matchType | NetworkManager connection type
The NetworkManager configuration settings reference roughly corresponds to connection types
|
| options/nixos/services.cross-seed.settings | Configuration options for cross-seed
|
| options/nixos/services.transfer-sh.secretFile | Path to file containing environment variables
|
| options/nixos/services.wiki-js.settings | Settings to configure wiki-js
|
| options/nixos/services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| packages/nixpkgs/vault-bin | Tool for managing secrets, this binary includes the UI |
| options/nixos/services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_id | Path to file that contains Client ID.
|
| options/nixos/services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| options/nixos/services.microbin.passwordFile | Path to file containing environment variables
|
| options/home-manager/programs.rclone.requiresUnit | The name of a systemd user service that must complete before the rclone
configuration file is written
|
| options/nixos/services.akkoma.initSecrets | Whether to initialise non‐existent secrets with random values
|
| options/nixos/services.stalwart.credentials | Credentials envs used to configure Stalwart secrets
|
| options/nixos/services.n8n.environment | Environment variables to pass to the n8n service
|
| packages/nixpkgs/kubeseal | Kubernetes controller and tool for one-way encrypted Secrets |
| options/nixos/services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_secret | Path to file that contains Client Secret.
|
| options/nixos/services.stalwart-mail.credentials | Credentials envs used to configure Stalwart-Mail secrets
|
| options/nixos/services.cfssl.configFile | Path to configuration file
|
| packages/nixpkgs/sops | Simple and flexible tool for managing secrets |
| packages/nixpkgs/ots | Share end-to-end encrypted secrets with others via a one-time URL |
| packages/nixpkgs/senv | Friends don't let friends leak secrets on their terminal window |
| packages/nixpkgs/vault | Tool for managing secrets |
| packages/nixpkgs/argocd-vault-plugin | Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets |
| options/nixos/services.pds.settings | Environment variables to set for the service
|
| options/nixos/services.movim.settings | .env settings for Movim
|
| packages/nixpkgs/proton-pass-cli | Command-line interface for managing your Proton Pass vaults, items, and secrets |
| options/nixos/services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.evcc.settings | evcc configuration as a Nix attribute set
|
| options/home-manager/programs.rclone.remotes | An attribute set of remote configurations
|
| options/nixos/services.maubot.settings | YAML settings for maubot
|
| options/nixos/services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| packages/nixpkgs/cliqr | Transfer, share data & secrets via console qr codes |
| options/nixos/services.listmonk.secretFile | A file containing secrets as environment variables
|
| packages/nixpkgs/ejson | Small library to manage encrypted secrets using asymmetric encryption |
| options/nixos/services.forgejo.customDir | Base directory for custom templates and other options
|
| options/nixos/services.dawarich.extraEnvFiles | Extra environment files to pass to all Dawarich services
|
| options/nixos/services.prosody.extraConfig | Additional prosody configuration
The generated file is processed by envsubst to allow secrets to be passed securely via environment variables.
|
| options/nixos/services.mastodon.extraEnvFiles | Extra environment files to pass to all mastodon services
|
| options/nixos/services.lasuite-docs.secretKeyPath | Path to the Django secret key
|
| options/nixos/services.lasuite-meet.secretKeyPath | Path to the Django secret key
|
| options/nixos/programs.nncp.settings | NNCP configuration, see
http://www.nncpgo.org/Configuration.html
|
| options/nixos/services.docuseal.extraEnvFiles | Extra environment files to pass to DocuSeal services
|
| options/nixos/services.sourcehut.hg.group | Group for hg.sr.ht
|
| options/nixos/services.keter.bundle.publicScript | Allows loading of public environment variables,
these are emitted to the log so it shouldn't contain secrets.
|
| options/nixos/services.patroni.settings | The primary patroni configuration
|
| options/nixos/services.sourcehut.man.group | Group for man.sr.ht
|
| options/nixos/services.sourcehut.git.group | Group for git.sr.ht
|
| options/nixos/services.sourcehut.hub.group | Group for hub.sr.ht
|
| options/nixos/services.pixelfed.settings | .env settings for Pixelfed
|
| options/nixos/services.cross-seed.settingsFile | Path to a JSON file containing settings that will be merged with the
settings option
|
| options/nixos/services.sourcehut.todo.group | Group for todo.sr.ht
|
| options/nixos/services.sourcehut.meta.group | Group for meta.sr.ht
|
| options/nixos/services.bluesky-pds.settings | Environment variables to set for the service
|
| options/nixos/services.lidarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.sonarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.radarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.canaille.secretKeyFile | File containing the Flask secret key
|
| options/nixos/services.microbin.settings | Additional configuration for MicroBin, see
https://microbin.eu/docs/installation-and-configuration/configuration/
for supported values
|
| options/nixos/services.zitadel.extraStepsPaths | A list of paths to extra steps files
|
| options/nixos/services.wastebin.settings | Additional configuration for wastebin, see
https://github.com/matze/wastebin#usage for supported values
|
| options/nixos/services.sourcehut.paste.group | Group for paste.sr.ht
|
| options/nixos/services.sourcehut.lists.group | Group for lists.sr.ht
|
| options/nixos/services.sourcehut.pages.group | Group for pages.sr.ht
|
| options/nixos/services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| options/nixos/services.godns.loadCredential | This can be used to pass secrets to the systemd service without adding
them to the nix store.
|
| options/nixos/services.transfer-sh.settings | Additional configuration for transfer-sh, see
https://github.com/dutchcoders/transfer.sh#usage-1
for supported values
|
| options/nixos/services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.pleroma.secretConfigFile | Path to the file containing your secret pleroma configuration.
DO NOT POINT THIS OPTION TO THE NIX
STORE, the store being world-readable, it'll
compromise all your secrets.
|
| packages/nixpkgs/decoder | "secrets" decoding for FRITZ!OS devices |
| packages/nixpkgs/summon | CLI that provides on-demand secrets access for common DevOps tools |
| options/nixos/services.zwave-js.settings | Configuration settings for the generated config file
|
| options/nixos/services.renovate.settings | Renovate's global configuration
|
| options/nixos/services.nomad.credentials | Credentials envs used to configure nomad secrets.
|
| options/nixos/services.maubot.extraConfigFile | A file for storing secrets
|
| options/nixos/services.readarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| options/nixos/services.windmill.database.url | Database url
|
| options/nixos/services.sourcehut.builds.group | Group for builds.sr.ht
|
| options/nixos/services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| options/nixos/services.wiki-js.environmentFile | Environment file to inject e.g. secrets into the configuration.
|
| packages/nixpkgs/ragenix | Age-encrypted secrets for NixOS, drop-in replacement for agenix |
| options/nixos/services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| options/nixos/services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.olivetin.extraConfigFiles | Config files to merge into the settings defined in services.olivetin.settings
|
| options/nixos/services.matrix-synapse.settings | The primary synapse configuration
|
| options/home-manager/programs.pianobar.settings | Apply configurations for pianobar via key/value attributes
|
| packages/nixpkgs/paper-age | Easy and secure paper backups of secrets |
| packages/nixpkgs/go-secdump | Tool to remotely dump secrets from the Windows registry |
| packages/nixpkgs/nms | A command line tool that recreates the famous data decryption
effect seen in the 1992 movie Sneakers.
|
| options/nixos/services.prowlarr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.whisparr.settings | Attribute set of arbitrary config options
|
| options/nixos/services.yarr.environmentFile | Environment file for specifying additional settings such as secrets
|
| options/nixos/services.pghero.environment | Environment variables to set for the service
|
| options/nixos/services.webdav.settings | Attrset that is converted and passed as config file
|
| options/nixos/services.fider.environment | Environment variables to set for the service
|
| packages/nixpkgs/teller | Cloud native secrets management for developers |
| packages/nixpkgs/pulumi-esc | Pulumi ESC (Environments, Secrets, and Configuration) for cloud applications and infrastructure |
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| options/nixos/services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| packages/nixpkgs/doppler | Official CLI for interacting with your Doppler Enclave secrets and configuration |
| packages/nixpkgs/berglas | Tool for managing secrets on Google Cloud |
| options/nixos/services.matrix-conduit.secretFile | Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5)
|
| options/nixos/services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| options/nixos/services.shiori.environmentFile | Path to file containing environment variables
|
| options/nixos/services.matrix-conduit.settings | Generates the conduit.toml configuration file
|
| options/nixos/services.zitadel.extraSettingsPaths | A list of paths to extra settings files
|
| options/nixos/services.mtprotoproxy.users | Allowed users and their secrets
|
| options/nixos/services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| options/nixos/services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| packages/nixpkgs/chamber | Tool for managing secrets by storing them in AWS SSM Parameter Store |
| packages/nixpkgs/entropy | Tool to scan your codebase for high entropy lines, which are often secrets |
| packages/nixpkgs/tartufo | Tool to search through git repositories for high entropy strings and secrets |
| options/nixos/services.open-webui.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.gatus.environmentFile | File to load as environment file
|
| packages/nixpkgs/jsluice | Tool for extracting URLs, paths, secrets, and other data from JavaScript source code |
| options/nixos/services.bcg.environmentFiles | File to load as environment file
|
| options/nixos/services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/nixos/services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| packages/nixpkgs/vault-medusa | Cli tool for importing and exporting Hashicorp Vault secrets |
| options/nixos/services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| options/nixos/services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| options/nixos/services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| options/nixos/services.patroni.environmentFiles | Environment variables made available to Patroni as files content, useful for providing secrets from files.
|
| options/nixos/services.litellm.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.orthanc.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| options/nixos/services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| options/nixos/services.invidious.extraSettingsFile | A file including Invidious settings
|
| options/nixos/services.traccar.settings | config.xml configuration as a Nix attribute set
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| packages/nixpkgs/github-to-sops | Tool for managing infrastructure secrets in git repositories using SOPS and GitHub SSH keys |
| options/nixos/services.beszel.hub.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.lasuite-docs.environmentFile | Path to environment file
|
| options/nixos/services.lasuite-meet.environmentFile | Path to environment file
|
| options/nixos/services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| options/nixos/services.screego.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| options/nixos/services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| options/nixos/services.homer.settings | Settings serialized into config.yml before build
|
| options/nixos/services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| options/darwin/services.telegraf.environmentFiles | File to load as environment file
|
| packages/nixpkgs/emiluaPlugins.botan | Securely clears secrets from memory in Emilua |
| options/nixos/services.dendrite.loadCredential | This can be used to pass secrets to the systemd service without adding them to
the nix store
|
| options/nixos/services.docling-serve.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| options/nixos/services.trilium-server.environmentFile | File to load as the environment file
|
| packages/nixpkgs/gitleaks | Scan git repos (or files) for secrets |
| options/nixos/services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| options/nixos/services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| options/nixos/services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| options/nixos/services.linkwarden.secretFiles | Attribute set containing paths to files to add to the environment of linkwarden
|
| packages/nixpkgs/apkleaks | Scanning APK file for URIs, endpoints and secrets |
| options/nixos/services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| options/nixos/services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| packages/nixpkgs/whispers | Tool to identify hardcoded secrets in static structured text |
| options/nixos/services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| options/nixos/services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| options/nixos/services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| options/darwin/services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| packages/nixpkgs/ggshield | Tool to find and fix various types of hardcoded secrets and infrastructure-as-code misconfigurations |
| packages/nixpkgs/gnome-keyring | Collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications |
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/nixos/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| options/nixos/services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| options/nixos/services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| options/nixos/services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.maubot.settings.homeservers | Known homeservers
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| packages/nixpkgs/dismember | Tool to scan memory for secrets |
| packages/nixpkgs/nodePackages.dotenv-vault | Secrets manager for .env files – from the same people that pioneered dotenv |
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/boot.initrd.network.openvpn.configuration | The configuration file for OpenVPN.
Unless your bootloader supports initrd secrets, this configuration
is stored insecurely in the global Nix store.
|
| options/nixos/services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| packages/nixpkgs/buttercup-desktop | Cross-Platform Passwords & Secrets Vault |
| packages/nixpkgs/ejson2env | Decrypt EJSON secrets and export them as environment variables |
| packages/nixpkgs/python313Packages.ixia | Connecting secrets' security with random's versatility |
| packages/nixpkgs/python314Packages.ixia | Connecting secrets' security with random's versatility |
| options/nixos/services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| options/nixos/services.woodpecker-server.environmentFile | File to load environment variables
from
|
| packages/nixpkgs/credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/regpg | GPG wrapper utility for storing secrets in VCS |
| options/nixos/services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| packages/nixpkgs/lssecret | Tool to list passwords and other secrets stored using the org.freedesktop.secrets dbus api |
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| options/nixos/services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| packages/nixpkgs/kubectl-view-secret | Kubernetes CLI plugin to decode Kubernetes secrets |
| options/nixos/services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| packages/nixpkgs/python313Packages.sslib | Python3 library for sharing secrets |
| packages/nixpkgs/python314Packages.sslib | Python3 library for sharing secrets |
| options/nixos/services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| options/nixos/services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| options/nixos/services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/nixos/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/darwin/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/nixos/services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/nixos/services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| packages/nixpkgs/nodePackages_latest.dotenv-vault | Secrets manager for .env files – from the same people that pioneered dotenv |
| packages/nixpkgs/jsubfinder | Tool to search for in Javascript hidden subdomains and secrets |
| options/nixos/services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| options/nixos/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/nixos/services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/darwin/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| packages/nixpkgs/python312Packages.ixia | Connecting secrets' security with random's versatility |
| packages/nixpkgs/libsecret | Library for storing and retrieving passwords and other secrets |
| options/nixos/services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| options/nixos/services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| packages/nixpkgs/python312Packages.sslib | Python3 library for sharing secrets |
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| packages/nixpkgs/blackbox | Safely store secrets in a VCS repo |
| packages/nixpkgs/libgnome-keyring | Framework for managing passwords and other secrets |
| packages/nixpkgs/vaultenv | Runs processes with secrets from HashiCorp Vault |
| options/nixos/services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| options/nixos/services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| options/nixos/services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| packages/nixpkgs/python313Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/secrethound | A powerful CLI tool designed to find secrets in JavaScript files, web pages, and other text sources. |
| packages/nixpkgs/python314Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| packages/nixpkgs/noseyparker | Find secrets and sensitive information in textual data |
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.matrix-synapse.settings.turn_shared_secret | The shared secret used to compute passwords for the TURN server
|
| packages/nixpkgs/python313Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/python312Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/python314Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| options/nixos/services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| packages/nixpkgs/python312Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/haskellPackages.vaultenv | Runs processes with secrets from HashiCorp Vault |
| packages/nixpkgs/python313Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| packages/nixpkgs/passdetective | Scans command history to detect mistakenly written passwords, API keys, and secrets |
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| packages/nixpkgs/python312Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/python313Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python312Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server | The API server addresses
|
| packages/nixpkgs/python313Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python313Packages.annotatedyaml | Annotated YAML that supports secrets for Python |
| packages/nixpkgs/python314Packages.annotatedyaml | Annotated YAML that supports secrets for Python |
| options/nixos/services.matrix-synapse.settings.registration_shared_secret | If set, allows registration by anyone who also has the shared
secret, even if registration is otherwise disabled
|
| packages/nixpkgs/python312Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python312Packages.annotatedyaml | Annotated YAML that supports secrets for Python |
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters | Whether to include the parameters as meta labels
|
| packages/nixpkgs/python313Packages.microsoft-security-utilities-secret-masker | Tool for detecting and masking secrets |
| packages/nixpkgs/python314Packages.microsoft-security-utilities-secret-masker | Tool for detecting and masking secrets |
| packages/nixpkgs/python312Packages.microsoft-security-utilities-secret-masker | Tool for detecting and masking secrets |
| options/nixos/services.pinchflat.selfhosted | Use a weak secret
|
| packages/nixpkgs/python313Packages.impacket | Network protocols Constructors and Dissectors |
| packages/nixpkgs/python314Packages.impacket | Network protocols Constructors and Dissectors |
| packages/nixpkgs/rPackages.SecretsProvider | |
| packages/nur/xddxdd.drone-vault | Drone plugin for integrating with the Vault secrets manager |
| packages/nur/toonn.sotp | Small utility to store AWS TOTP secrets into Sops encryptedfiles and generate OTP on the command line |
| packages/nur/xddxdd.uncategorized.drone-vault | Drone plugin for integrating with the Vault secrets manager |
| packages/nur/DanNixon.keyprs | A very barebones tool to backup secrets to paper. |
| packages/nur/xddxdd.drone-file-secret | Secret provider for Drone CI that reads secrets from a given folder |
| packages/nur/xddxdd.uncategorized.drone-file-secret | Secret provider for Drone CI that reads secrets from a given folder |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-dump | |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-unlock | |
| packages/nur/colinsane.pkgs.sane-scripts.secrets-update-keys | |