secret-mask

secret-mask

Your terminal leaks secrets. This replaces them with playful phrases, not ***

secret-mask demo — pipe env vars through secret-mask
Before
AWS_SECRET_KEY=AKIAIOSFODNN7EXAMPLE DATABASE_URL=postgres://admin:[email protected] STRIPE_SK=sk_live_4eC39HqLyjWDarjtT1zdp7dc
After
AWS_SECRET_KEY=a]sunny DATABASE_URL=postgres://admin:c][email protected] STRIPE_SK=b]meadow
🎙
Screen-share safe Pipe any output through secret-mask before sharing your terminal on a call.
Playful, not paranoid Replaces secrets with readable words instead of *** walls. You can still tell things apart.
Consistent mapping Same secret always maps to the same word within a session. Debugging stays possible.
Modes
Pipecat .env | secret-mask Shellsecret-mask shell wraps your entire session