Omazy Secrets is a local-first secrets platform for developers and AI agents. Load secrets by directory context, reference them as om:// URIs, and inject them only at runtime
Zero-knowledge architecture with native AI agent support
Secrets automatically load when you enter a directory and unload when you leave.
Reference secrets as om://vault/item/field URIs. No more hardcoded credentials.
Native MCP integration. AI agents can query secrets with human approval gates.
Built as a Rust CLI with daemon. Fast, secure, and works offline.
AES-256-GCM encryption. Master key never leaves your machine.
Service accounts, RBAC, audit logs, and self-hosted Connect Server.
Get started in under one minute with our simple workflow.
Create a vault environment mapped to your project directory, then trust it once with om allow — secrets load automatically on every cd.
Prefix any command with om run to inject secrets into the process environment at runtime — nothing is written to disk.
Render secret-injected config files from .tpl templates at deploy time — no plaintext secrets ever touch your repo or CI logs.
End-to-end integration of om CLI — from environment setup to secret-injected deployment.
John pushed a new environment to the shared vault. Your CLI detects the update and prompts you to sync.
Omazy Secrets is currently in private alpha. Request early access below — we'll send you installation instructions when you're approved.
brew install omazy/tap/om curl -sL https://secrets.omazy.ai/install.sh | bash iwr https://secrets.omazy.ai/install.ps1 -useb | iex Native integration with bash and zsh. One command to wire up auto-injection for every new shell session.
~/.bashrc · ~/.bash_profile
~/.zshrc · Oh-My-Zsh plugin
cd Scoped per directory Zero env var leakage Works with tmux & screen Oh-My-Zsh compatible Starship prompt ready Secrets flow securely from dev to production — encrypted end-to-end, audited per push, and zero plaintext on the wire.
Push your dev secrets to the shared vault, promote to production — all from the CLI.
Enterprise tools solve enterprise problems — servers, budgets, and ops teams. Neither HashiCorp Vault nor 1Password CLI was designed for a developer's laptop. See how Omazy Secrets compares.
"There are over 200 topics complex enough in HashiCorp Vault to deserve a complete tutorial. If we want secrets management to be mainstream in small projects, it needs to be much simpler."
"Every time I open a new Cursor window, it triggers 12+ biometric prompts simultaneously — one per MCP server. I have to click Approve 12 times in a row just to start working."
"The breaking point came when every solution we tried made deployments dependent on external services. Someone needs the staging DB URL, so it gets shared over Slack."
No servers to spin up. No subscription required. No secrets shared over Slack. One binary, one command, and your secrets are encrypted locally — always available, offline, and never leaving your machine.
Secrets management is broken at every phase of development. These are real problems — not edge cases.
"Accidentally committed my .env file with real AWS keys to a public GitHub repo. Got a $4,200 bill the next morning from someone mining crypto. GitHub's secret scanning caught it 6 hours too late."
u/burned_by_aws · 847 comments"new dev joined the team. day 1. someone had to DM them the .env file over Slack. the file had prod DB creds in it. this is the industry standard apparently"
@swyx · 312 retweets"Our entire team of 8 devs all have a slightly different version of the .env file. Nobody knows which is canonical. We've had three outages this month because someone ran with stale creds."
u/env_hell_survivor · 203 comments"Every tutorial says 'add your API key here' and 'don't commit your .env'. But nobody explains how to actually share secrets with your team without emailing them around or putting them in Notion."
on Fireship · "Never store secrets in .env files""the .env file is just a shared password in a text file that lives on everyone's laptop. we've spent 20 years building zero-trust networks and then we do this"
@t3dotgg · 741 retweets"Rotated a production secret. Forgot to update it on two servers. Both crashed at 2am. Spent 4 hours debugging. The secret was still hardcoded in a config file nobody knew existed."
u/3am_oncall_regrets · 512 commentsom connects to Slack for activity notifications and secret lookups — but never shares actual values. References are shared as om://MyVault/App-Dev/STRIPE_KEY URIs. The recipient resolves it locally through their own authenticated om daemon. The secret never leaves their machine.
omSecrets live in an encrypted local vault, sync end-to-end across your team, and inject at runtime only. No plaintext. No .env files. No sharing over chat. No disk writes.
om sync — E2E encrypted, no Slack, no email