@dotarc/cli
v0.3.1
Published
DotArc CLI — stop sharing secrets, start syncing them.
Downloads
1,925
Readme
DotArc CLI
Stop sharing secrets, start syncing them.
DotArc is an "Apple-grade" secrets management platform designed to kill the plain-text .env file forever. The DotArc CLI provides a zero-trust bridge between your encrypted cloud vault and your local development environment.
Why DotArc?
Traditional secret management is broken. Sharing .env files over Slack, committing keys to GitHub, and keeping plain-text secrets on your hard drive are massive security liabilities.
DotArc fixes this by injecting secrets directly into your process memory at runtime. No secrets on disk. No manual sharing. Just clean, encrypted syncing.
Quick Start
1. Installation
Install the CLI globally via npm:
npm install -g @dotarc/cli2. Authentication
Securely link your machine using our browser-based OAuth handshake:
dotarc login3. Initialize your Project
Link your current directory to a DotArc project and environment:
dotarc initTip: DotArc will automatically detect your local .env and offer to sync it to the cloud vault for you.
Core Commands
dotarc run -- <your-command>
The Gold Standard. Injects your secrets directly into your process without ever writing them to disk.
dotarc run -- npm run devThe Obsidian Core: When you use run, DotArc activates a secure runtime guard that:
- Redacts secrets from
console.logoutput. - Detects and blocks environment memory dumps.
- Sends live security violation alerts to your dashboard.
dotarc pull
For legacy workflows that require a file on disk. Generates a .env file and automatically patches your .gitignore to prevent accidental commits.
dotarc pull --env production --output .env.proddotarc push <key> [value]
Quickly add or update a secret in the cloud vault from your terminal.
dotarc push STRIPE_SK sk_live_...dotarc detect
Audit your codebase for hardcoded secrets (AWS keys, Stripe tokens, etc.) and environment variable usage.
dotarc detect . --leaks-onlyCommand Reference
| Command | Description |
| :--- | :--- |
| login | Authenticate via browser OAuth or API token. |
| init | Link directory to a project and patch package.json. |
| run | Execute a command with injected secrets (Direct-to-Memory). |
| pull | Download secrets to a local file. |
| push | Create/Update secrets in the cloud vault. |
| scan | Perform a runtime security audit for secret exfiltration. |
| verify | Test SDK/API compatibility with the secure runtime. |
| whoami | Show the currently authenticated user. |
Security First
DotArc uses AES-256-GCM encryption for all secrets at rest. By using dotarc run, you ensure that sensitive credentials only exist in the volatile memory of your process, significantly reducing the attack surface of your development machine.
Links
Built with ❤️ by the DotArc Team. "Security shouldn't just be effective; it should be beautiful."
