Credentials

Keychain-based API key management for 18 services

Credentials

macOS Keychain-based credential management. API keys stored encrypted, retrieved via the security command, never in plain text files.

Managed Services

ServiceKey TypeStatus
GitHubPersonal Access TokenConfigured
AnthropicAPI KeyConfigured
VercelTokenConfigured
NeonAPI KeyConfigured
StripeSecret KeyConfigured
SentryAuth TokenPlanned
LinearAPI KeyPlanned
PostHogAPI KeyPlanned
NotionAPI KeyPlanned
SlackBot TokenPlanned
FigmaAccess TokenPlanned
ResendAPI KeyPlanned
CloudinaryAPI SecretPlanned
ImageKitPrivate KeyPlanned

Commands

Check Status

credentials.sh status

Shows which keys are configured and which are missing.

Set a Key

credentials.sh set GITHUB_TOKEN ghp_xxxxxxxxxxxxx

Stores the key in macOS Keychain under the kun service.

Get a Key

credentials.sh get GITHUB_TOKEN

Retrieves from Keychain — never stored in a file.

Export to Environment

credentials.sh export

Exports all stored keys as environment variables for the current session.

Setup All

credentials.sh setup

Interactive setup — walks through each required key.

How It Works

Storage

Keys are stored in macOS Keychain using the security command:

# Store
security add-generic-password -a "kun" -s "GITHUB_TOKEN" -w "ghp_xxx" -U
 
# Retrieve
security find-generic-password -a "kun" -s "GITHUB_TOKEN" -w

Security

  • Encrypted at rest by macOS Keychain
  • Protected by your Mac login password
  • Never written to disk in plain text
  • Not committed to git
  • Per-machine, not shared

Safari Password Integration

For web services that need browser login, credentials.sh can reference Safari's saved passwords:

credentials.sh login vercel
# Opens Safari to vercel.com with saved credentials

Windows Alternative

On Windows, secrets are managed via the gist-based system:

# Setup secrets from private gist
.\.claude\scripts\secrets.ps1 -GistId YOUR_GIST_ID

This downloads encrypted secrets from a private GitHub gist and configures environment variables.