| packages/nixpkgs/gnome-keyring | Collection of components in GNOME that store secrets, passwords, keys, certificates and make them available to applications |
| options/nixos/services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| options/nixos/services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/nixos/services.telegraf.environmentFiles | File to load as environment file
|
| options/nixos/services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| options/nixos/services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| options/nixos/services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| options/nixos/services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.maubot.settings.homeservers | Known homeservers
|
| options/nixos/services.pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| packages/nixpkgs/dismember | Tool to scan memory for secrets |
| packages/nixpkgs/nodePackages.dotenv-vault | Secrets manager for .env files – from the same people that pioneered dotenv |
| options/nixos/services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| options/nixos/boot.initrd.network.openvpn.configuration | The configuration file for OpenVPN.
Unless your bootloader supports initrd secrets, this configuration
is stored insecurely in the global Nix store.
|
| options/nixos/services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| options/nixos/services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| packages/nixpkgs/buttercup-desktop | Cross-Platform Passwords & Secrets Vault |
| packages/nixpkgs/ejson2env | Decrypt EJSON secrets and export them as environment variables |
| packages/nixpkgs/python313Packages.ixia | Connecting secrets' security with random's versatility |
| packages/nixpkgs/python314Packages.ixia | Connecting secrets' security with random's versatility |
| options/nixos/services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| options/nixos/services.woodpecker-server.environmentFile | File to load environment variables
from
|
| packages/nixpkgs/credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/regpg | GPG wrapper utility for storing secrets in VCS |
| options/nixos/services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| packages/nixpkgs/lssecret | Tool to list passwords and other secrets stored using the org.freedesktop.secrets dbus api |
| options/nixos/services.bluesky-pds.environmentFiles | File to load environment variables from
|
| options/nixos/services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| options/nixos/services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| packages/nixpkgs/kubectl-view-secret | Kubernetes CLI plugin to decode Kubernetes secrets |
| options/nixos/services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| packages/nixpkgs/python313Packages.sslib | Python3 library for sharing secrets |
| packages/nixpkgs/python314Packages.sslib | Python3 library for sharing secrets |
| options/nixos/services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| options/nixos/services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| options/nixos/services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/darwin/services.buildkite-agents.<name>.hooks.environment | The environment hook will run before all other commands, and can be used
to set up secrets, data, etc
|
| options/nixos/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/darwin/services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| options/nixos/services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| options/nixos/services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| options/nixos/services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| packages/nixpkgs/nodePackages_latest.dotenv-vault | Secrets manager for .env files – from the same people that pioneered dotenv |
| packages/nixpkgs/jsubfinder | Tool to search for in Javascript hidden subdomains and secrets |
| options/nixos/services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| options/nixos/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| options/nixos/services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| options/darwin/services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| packages/nixpkgs/python312Packages.ixia | Connecting secrets' security with random's versatility |
| packages/nixpkgs/libsecret | Library for storing and retrieving passwords and other secrets |
| options/nixos/services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| options/nixos/services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| options/nixos/services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| options/nixos/services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| packages/nixpkgs/python312Packages.sslib | Python3 library for sharing secrets |
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| packages/nixpkgs/blackbox | Safely store secrets in a VCS repo |
| packages/nixpkgs/libgnome-keyring | Framework for managing passwords and other secrets |
| packages/nixpkgs/vaultenv | Runs processes with secrets from HashiCorp Vault |
| options/nixos/services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| options/nixos/services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| options/nixos/services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| packages/nixpkgs/python313Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/secrethound | A powerful CLI tool designed to find secrets in JavaScript files, web pages, and other text sources. |
| packages/nixpkgs/python314Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| options/nixos/services.pufferpanel.environment | Environment variables to set for the service
|
| packages/nixpkgs/noseyparker | Find secrets and sensitive information in textual data |
| options/nixos/services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.matrix-synapse.settings.turn_shared_secret | The shared secret used to compute passwords for the TURN server
|
| packages/nixpkgs/python313Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/python312Packages.whispers | Tool to identify hardcoded secrets in static structured text |
| packages/nixpkgs/python314Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| options/nixos/services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| options/nixos/services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| options/nixos/services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| packages/nixpkgs/python312Packages.credstash | Utility for managing secrets in the cloud using AWS KMS and DynamoDB |
| packages/nixpkgs/haskellPackages.vaultenv | Runs processes with secrets from HashiCorp Vault |
| packages/nixpkgs/python313Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| packages/nixpkgs/passdetective | Scans command history to detect mistakenly written passwords, API keys, and secrets |
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| packages/nixpkgs/python312Packages.bundlewrap-pass | Use secrets from pass in your BundleWrap repo |
| packages/nixpkgs/python313Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| packages/nixpkgs/python312Packages.bundlewrap-keepass | Use secrets from keepass in your BundleWrap repo |
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server | The API server addresses
|
| packages/nixpkgs/python313Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |
| packages/nixpkgs/python314Packages.bundlewrap-teamvault | Pull secrets from TeamVault into your BundleWrap repo |