Documentation
Everything you need to manage secrets with secr — from CLI setup to SDK integration.
Getting Started
Features
Secret Scanning
Detect leaked secrets in your codebase with 20+ patterns
Secret Promotion
Copy secrets between environments (dev -> staging -> prod)
Secret Templates
Define required keys per project to catch missing secrets
Webhooks
Get notified when secrets change via HTTP webhooks
Provider Import
Import env vars from Render, Vercel, Heroku, Netlify, Supabase, and Railway
SDKs
Integrations
VS Code Extension
Browse, edit, scan, and audit secrets from your editor sidebar
GitHub Actions
Inject secrets in CI with the secr composite action
Vercel
Auto-inject secrets before Vercel builds
Netlify
Netlify Build Plugin for automatic secret injection
Postman
Export secrets as Postman environment files for API testing
Framework Guides
Next.js + Vercel
Full walkthrough: local dev, Server Components, NEXT_PUBLIC_ vars, and Vercel deploys
Remix + Netlify
Full walkthrough: loaders, actions, .server.ts patterns, and Netlify deploys
SvelteKit + Railway
Full walkthrough: $env modules, adapter-node, and Railway build/runtime secrets
Laravel + Forge
Full walkthrough: config:cache, deploy scripts, queue workers, and Herd/Valet
Security
API
Quick Start
npm i -g @secr/cli
secr init
secr set --from-env .env