home / skills / sickn33 / antigravity-awesome-skills / varlock-claude-skill
This skill helps you securely manage environment variables in Claude sessions, preventing secrets exposure in terminals, logs, or git commits.
npx playbooks add skill sickn33/antigravity-awesome-skills --skill varlock-claude-skillReview the files below or copy the command above to add this skill to your agents.
---
name: varlock-claude-skill
description: "Secure environment variable management ensuring secrets are never exposed in Claude sessions, terminals, logs, or git commits"
source: "https://github.com/wrsmith108/varlock-claude-skill"
risk: safe
---
# Varlock Claude Skill
## Overview
Secure environment variable management ensuring secrets are never exposed in Claude sessions, terminals, logs, or git commits
## When to Use This Skill
Use this skill when you need to work with secure environment variable management ensuring secrets are never exposed in claude sessions, terminals, logs, or git commits.
## Instructions
This skill provides guidance and patterns for secure environment variable management ensuring secrets are never exposed in claude sessions, terminals, logs, or git commits.
For more information, see the [source repository](https://github.com/wrsmith108/varlock-claude-skill).
This skill provides secure environment variable management for Claude-based workflows, ensuring secrets are never exposed in agent sessions, terminal output, logs, or git commits. It delivers patterns and runtime guards to detect, mask, and prevent accidental leakage of API keys, tokens, and other sensitive values. The design focuses on safe developer ergonomics and automated scanning to reduce human error.
The skill inspects environment variable usage across interactive Claude sessions, shell commands, and application runtime, looking for plain-text secrets and risky operations. It adds runtime wrappers and masking layers that replace or redact sensitive values before they reach terminals, logs, or outbound messages. It also integrates checks to flag potential git commits and history that contain secrets and recommends remediation steps.
Will this skill store my secrets?
No. The skill operates by masking and wrapping access to environment variables; it does not persist raw secret values.
Can it prevent all secret leaks automatically?
It reduces risk by blocking common leak vectors and automating redaction, but it complements—does not replace—secure practices like key rotation and least privilege.
Does it modify git history to remove secrets?
It flags and prevents commits with detected secrets; historical removal requires explicit git history rewriting and follow-up remediation steps.