npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@jacobtread/secret-sync

v0.2.0

Published

CLI tool for syncing local secret files with remote secret managers

Readme

Secret-sync

Tests Status

secret-sync is a CLI tool for quickly and easily synchronizing local secrets file (.env and other configuration files) with remote secrets manager such AWS Secret Manager (or self-hosted alternatives like Loker)

secret-sync supports both pulling secrets out of secret managers and pushing secrets into secret managers.

CLI tool for syncing local secret files with remote secret managers

Usage: secret-sync.exe [OPTIONS] <COMMAND>

Commands:
  pull        Pull the current secrets, storing the secret values in their respective files
  push        Push a secret file updating its value in the secret manage
  quick-pull  Perform a quick pull without a configuration file
  quick-push  Perform a quick push without requiring a configuration file
  help        Print this message or the help of the given subcommand(s)

Options:
  -c, --config <CONFIG>    Optional custom path to the secret-sync.toml configuration file. By default secret-sync.toml (and secret-sync.json) is searched for in each parent directory until discovered
  -f, --format <FORMAT>    Output format to use when providing command output [default: human] [possible values: human, json]
  -d, --disable-color      Disable color in the output
      --profile <PROFILE>  Override AWS profile to use the sdk with
  -r, --region <REGION>    Optionally override the AWS region
  -h, --help               Print help (see more with '--help')
  -V, --version            Print version

Installation

The recommended installation method when using secret-sync within a NPM based project is to use the npm install method

Manual binary downloads are available in Releases

Install prebuilt binaries into your npm project

npm install @jacobtread/secret-sync

Install prebuilt binaries via shell script (Global)

curl --proto '=https' --tlsv1.2 -LsSf https://github.com/jacobtread/secret-sync/releases/latest/download/secret-sync-installer.sh | sh

Install prebuilt binaries via powershell script (Global)

powershell -ExecutionPolicy Bypass -c "irm https://github.com/jacobtread/secret-sync/releases/latest/download/secret-sync-installer.ps1 | iex"

Configuration

secret-sync will search the current working directory for a secret-sync.toml (or secret-sync.json) file. If one is not found the parent directories will be searched.

# Optional: Provider configuration (For future extension to other secrets managers)
[backend]
provider = "aws"

# Optional: AWS configuration
[aws]
# Optional: AWS profile override
profile = "example"
# OptionaL: AWS region override
region = "ap-southeast-2"
# Optional: AWS secrets endpoint override
endpoint = "https://secrets.example.com"

# Optional: Specify custom AWS access credentials
[aws.credentials]
access_key_id = "test"
access_key_secret = "secret"

[files.example]
# Path to the secret file relative to the secret-sync.toml or an absolute path
path = ".env"
# The secret manager secret to store/retrieve the data into/from
secret = "example"

# or the one line metadata = { description = "..etc" }
[files.example.metadata]
# Optional: Description that will be used for the secret on initial creation when pushing if not already existing
description = "Test description"
# Optional: AWS secret tags that will be attached on first push if the secret doesn't exist
tags = { "environment" = "production" }

# Specifying additional files
[files.example-2]
path = ".env.secondary"
secret = "example-2"

Minimal Example

[files.example]
path = ".env"
secret = "example"
metadata = { description = "Example Secret" }