Just-in-Time Secrets Access: Eliminating Plaintext Secrets in DevOps

Krzysztof Wiatrzyk

Secrets Mismanagement in Local Development

One of the most common security mistakes in software development is storing secrets - such as AWS access keys - in plaintext files like .env. Too often, we see sensitive credentials accidentally committed to Git repositories, posing a major security risk. Why does this keep happening?

  • Applications need access to cloud resources (e.g., SQS queues, databases, API keys).

  • .env files are mistakenly included in repositories due to missing .gitignore rules.

  • Developers assume that adding .env to .gitignore is a sufficient solution - until they forget to do it in a new project.

The real issue? Secrets are stored in plaintext somewhere on the filesystem. This makes them vulnerable to leaks, accidental sharing, and exposure in shell history logs.

Why This Is a Serious Security Risk

A single leaked credential can compromise an entire infrastructure. Attackers can escalate privileges, exfiltrate data, or even hijack cloud accounts. Traditional fixes, like manually updating .gitignore or using encrypted vaults that still require manual retrieval, don’t solve the core problem: developers are handling secrets insecurely.

Additionally, secrets stored in environment variables persist across sessions, increasing the risk of accidental exposure. This is especially dangerous in CI/CD pipelines, local development, and collaborative environments where multiple engineers access the same system.

Just-in-time Secrets Access with Direnv + Gopass

To eliminate the risk of secret leakage, we need a secure, automated way to manage them. Our approach:

  • Secrets should never be stored in unencrypted files.

  • Secrets should not be passed as CLI arguments (to avoid them being saved in shell history).

  • Secrets should be injected only when needed and removed when no longer required.

Step 1: Direnv – Context-Aware Secrets Loading

Direnv is a tool that automatically loads environment variables when entering a directory and removes them when leaving. This ensures that secrets are available only when necessary and never persist longer than required.

How it works:

  1. Install direnv and integrate it with your shell.

  2. Create a .envrc file inside your project directory.

  3. Add environment variables dynamically, e.g.,

    export SECRET=$(gopass show demo/secret)


  4. Run direnv allow to approve execution.

  5. When you enter the directory, the secret is loaded; when you leave, it is automatically removed.

Step 2: Gopass – Secure Secrets Storage

Gopass is an encrypted password manager built for teams. It securely stores secrets using PGP encryption and integrates seamlessly with Direnv.

How it works:

  1. Install gopass and set it up with a PGP key.

  2. Store secrets securely:
    gopass insert demo/secret

  3. Retrieve secrets dynamically via Direnv:
    export SECRET=$(gopass show demo/secret)

  4. The secret is only available when needed and removed once the session ends.

Additional Use Cases: Extending to Cloud Secrets Providers

Direnv and Gopass can integrate with other secrets management tools, such as:

  • AWS SSM Parameter Store:

    export SECRET=$(aws ssm get-parameter --name "/my-secret" --with-decryption | jq -r ".Parameter.Value")


  • HashiCorp Vault:

    export SECRET=$(vault kv get --field=SECRET kv/development/my-app)


  • Infisical (Open Source Doppler Alternative):


    export $(infisical export | tr -d "'")

Advanced: Taskfile + Gopass for One-Time Secret Injection

For use cases where secrets should only exist within a single process (e.g., running Terraform or Ansible), we can use Taskfile to inject secrets at runtime:

version: '3'
tasks:
  terraform:plan:
    env:
      CLOUDFLARE_API_KEY:
        sh: gopass show cloudflare/api-key
    cmds:
      - terraform plan

This ensures secrets are never exposed in the shell and exist only for the duration of the command.

Conclusion: Secure Your Secrets Today

At Let’s Go DevOps, we help teams implement best practices for secure secrets management, reducing risks and improving operational security. Using tools like Direnv, Gopass, and cloud-based secrets managers, you can eliminate plaintext secrets exposure while maintaining developer productivity.

Want to expand the topic?

Want to expand the topic?

Address:

Let's Go DevOps Sp z o.o.
Zamknięta Str. 10/1.5
30-554 Cracow, Poland

View our profile
desingrush.com

Let’s arrange a free consultation

Just fill out the form below and we will contact you via email to arrange a free call to discuss your project scope and share our insights from similar projects.

© 2024 Let’s Go DevOps. All rights reserved.

Address:

Let's Go DevOps Sp z o.o.
Zamknięta Str. 10/1.5
30-554 Cracow, Poland

View our profile
desingrush.com

Let’s arrange a free
consultation

Just fill out the form below and we will contact you via email to arrange a free call to discuss your project scope and share our insights from similar projects.

© 2024 Let’s Go DevOps. All rights reserved.

Address:

Let's Go DevOps Sp z o.o.
Zamknięta Str. 10/1.5
30-554 Cracow, Poland

View our profile
desingrush.com

Let’s arrange a free consultation

Just fill out the form below and we will contact you via email to arrange a free call to discuss your project scope and share our insights from similar projects.

© 2024 Let’s Go DevOps. All rights reserved.