TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Infisical – open-source secrets manager

232 pointsby vmatsiiakoover 2 years ago
Last month, we open-sourced Infisical (<a href="https:&#x2F;&#x2F;github.com&#x2F;Infisical&#x2F;infisical">https:&#x2F;&#x2F;github.com&#x2F;Infisical&#x2F;infisical</a>) - a simple, end-to-end encrypted tool to sync environment variables across your team and infrastructure. You can use it to store environment variables and inject them into your applications locally or into CI&#x2F;CD and production infrastructure. It can be used with any language&#x2F;framework and is platform independent with a super easy setup.<p>We know secret managers exist but, in our experience, they’re too complicated, not comprehensive, not user-friendly, or a mix of all three — other nicer ones are closed-source and don’t have self-hosted options available. That’s why we’re on a mission to make secret management more accessible to every developer — not just security teams.<p>We’ve launched this repo under the MIT license so any developer can use the tool. The goal is to not charge individual developers. We make money by charging a license fee for some future enterprise features as well as providing a hosted version and support.<p>In the coming weeks, we plan to add features like key rotation, access logs + more integrations. We’d love to hear your thoughts and any feature requests!<p>Give it a try (<a href="https:&#x2F;&#x2F;github.com&#x2F;Infisical&#x2F;infisical">https:&#x2F;&#x2F;github.com&#x2F;Infisical&#x2F;infisical</a>), and let us know what you think!<p>Main website: <a href="https:&#x2F;&#x2F;infisical.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;infisical.com&#x2F;</a>

19 comments

jbotzover 2 years ago
Environment variables are not a good way to pass secrets around. For a list of reasons see this 2017 blog post: <a href="https:&#x2F;&#x2F;blog.diogomonica.com&#x2F;&#x2F;2017&#x2F;03&#x2F;27&#x2F;why-you-shouldnt-use-env-variables-for-secret-data&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.diogomonica.com&#x2F;&#x2F;2017&#x2F;03&#x2F;27&#x2F;why-you-shouldnt-us...</a><p>The TLDR is, first environment variables are visible to every process running as the same user on the system (try &#x27;ps eww&#x27;) and second they leak very easily in debug logs, etc.
评论 #34057114 未加载
评论 #34058460 未加载
评论 #34061111 未加载
评论 #34059389 未加载
评论 #34057217 未加载
评论 #34056145 未加载
thamerover 2 years ago
I didn&#x27;t see any reference to an external security audit on your website, so have you done one and if not are you planning to? All serious products in this space publish these third-party audits and sometimes certifications.<p>See the page for Vault: <a href="https:&#x2F;&#x2F;www.hashicorp.com&#x2F;vault-compliance" rel="nofollow">https:&#x2F;&#x2F;www.hashicorp.com&#x2F;vault-compliance</a><p>Or 1Password: <a href="https:&#x2F;&#x2F;support.1password.com&#x2F;security-assessments&#x2F;" rel="nofollow">https:&#x2F;&#x2F;support.1password.com&#x2F;security-assessments&#x2F;</a><p>As the comment from jbotz mentioned, exposing secrets in environment variables seems like a major issue and it would be one of the first points covered in such an audit.
评论 #34056795 未加载
turtledragonflyover 2 years ago
Ahhh, a self-hosting option. I might actually take a look at it!<p>I&#x27;m so tired of systems handling highly-confidential information (such as passwords and secrets material) being Cloud-only. Or even cloud-first.
评论 #34056461 未加载
评论 #34057171 未加载
gregwebsover 2 years ago
This looks great! But after looking through the docs and Github, I don&#x27;t know what the architecture is beyond there is a CLI and a browser UI that interact with some sort of central service.<p>The main thing stopping me from using Vault is that it can become a central point of failure. If the cloud provider secret managers are down then its likely that something else in the cloud is having major issues as well so from an uptime perspective and easy of operations that has always seemed a safe approach, although the pricing is kind of outrageous. But just storing (e2e encrypted, etc) in cloud object storage is also an option. Berglass for example gives the option of storing in the secret manager or in cloud storage directly: <a href="https:&#x2F;&#x2F;github.com&#x2F;GoogleCloudPlatform&#x2F;berglas">https:&#x2F;&#x2F;github.com&#x2F;GoogleCloudPlatform&#x2F;berglas</a>
评论 #34056375 未加载
ponytechover 2 years ago
Is there an API to programmatically retrieve secrets or is it CLI only?<p>On a previous project I used the HVAC python library to get secrets from Vault and configure a Django project. (thus not using env vars at all) It would be nice to be able to do the same with Infisical.
评论 #34059777 未加载
评论 #34058158 未加载
tony-infisicalover 2 years ago
Hey everyone!<p>Stoked to show y&#x27;all what we&#x27;ve been working on this past few months.<p>Appreciate your feedback and will be hanging out here to answer any questions :)
评论 #34056421 未加载
mberningover 2 years ago
I just can’t get over using environment variables for this type of stuff. An attacker can bootstrap a lot just from compromising an ssh login. Platforms like JWS had the right idea. You used tokens in config files and the platform vault knew how to inject the value at runtime. Nothing was exposed in the environment variables or run command.
评论 #34058565 未加载
NathanFlurryover 2 years ago
Congrats on the launch!<p>The first thing that strikes me is the flat organizational structure of secrets. We have at least 45 KV secrets per environment in Vault organized in a directory structure over at Rivet. Managing access policies and organizing these without a directory structure would not be fun.
评论 #34057255 未加载
评论 #34057284 未加载
IncRndover 2 years ago
<p><pre><code> HN Title: Infisical – open-source secrets manager Github text: Infisical is an open-source, end-to-end encrypted tool to sync environment variables across your team and infrastructure. </code></pre> Which does it do? Does it manage secrets, or does it sync environment variables?
评论 #34056752 未加载
TommyDANGerousover 2 years ago
This is awesome! We use Doppler at the moment but this looks good to switch over.
评论 #34060929 未加载
mousetreeover 2 years ago
Is this like an open-source version of Doppler? Love Doppler.
评论 #34056628 未加载
stuaxoover 2 years ago
Great !<p>I will have to have a play with this.<p>After losing a laptop I&#x27;ve been wanting setting to manage env vars for local dev projects that keeps on them encrypted at rest.
评论 #34059199 未加载
shrisukhaniover 2 years ago
This looks great! Vault is such a headache sometimes... Will consider switching
Alifatiskover 2 years ago
Reminds be a bit of Vault but easier, I&#x27;ll give it a try with Docker!
评论 #34056057 未加载
olekennethover 2 years ago
You lost me at - just enter username and password.
评论 #34058105 未加载
vorpalhexover 2 years ago
It looks like part of your plan is to charge for premium plugins.<p>How do you intend to react to open source clones of such plugins?
评论 #34055767 未加载
yardenstover 2 years ago
Thanks guys looks very useful to us
candiddevmikeover 2 years ago
Obligatory how does this compare to Vault or Conjur?
评论 #34055896 未加载
goodpointover 2 years ago
meh.
评论 #34056383 未加载
评论 #34056351 未加载