@coxless/execenv
v0.2.0
Published
Decrypt SOPS-encrypted config in memory and exec your command with injected env vars
Readme
execenv
Decrypt a SOPS-encrypted config file in memory and hand off to your command via execve, so secrets never persist in a child process or on disk.
Install
npm install -g @coxless/execenvRequires:
- Linux x64 (only supported platform for now)
sopson yourPATH
Usage
execenv --provider sops --file .env.enc -- your-app arg1 arg2Security model
| Mechanism | Effect |
|---|---|
| execve (not spawn) | execenv replaces itself with your app. Secrets vanish from memory when your app starts. |
| Zeroizing<T> | Decrypted strings are wiped when they go out of scope. |
| PR_SET_DUMPABLE 0 | Prevents /proc/<pid>/mem reads and core dumps while execenv is running (Linux only). |
Full documentation
See the execenv GitHub repository for SOPS setup, security details, and development guides.
