| Crates.io | lazy-locker |
| lib.rs | lazy-locker |
| version | 0.0.7 |
| created_at | 2025-12-06 17:14:38.120254+00 |
| updated_at | 2025-12-07 00:13:46.931345+00 |
| description | A secure local secrets manager with TUI interface and SDK support |
| homepage | |
| repository | https://github.com/WillIsback/lazy-locker |
| max_upload_size | |
| id | 1970440 |
| size | 296,640 |
A secure local secrets manager with TUI interface and SDK support.
Lazy-Locker replaces plain-text .env files with encrypted local storage, providing seamless integration with Python and JavaScript/TypeScript projects.
python-dotenvdotenv# Clone and build
git clone https://github.com/WillIsback/lazy-locker.git
cd lazy-locker
cargo build --release
# Install globally
sudo cp target/release/lazy-locker /usr/local/bin/
# Start Lazy-Locker and create your passphrase
lazy-locker
Press a to add your first secret, then use it in your code:
Python:
from lazy_locker import inject_secrets
inject_secrets()
import os
api_key = os.environ["MY_API_KEY"]
JavaScript/TypeScript:
import { injectSecrets } from 'lazy-locker';
await injectSecrets();
const apiKey = process.env.MY_API_KEY;
Run your scripts normally - no wrapper needed!
python my_script.py
uv run my_script.py
bun run my_script.ts
| Key | Action |
|---|---|
↑/↓ |
Navigate secrets |
a |
Add new secret |
e |
Reveal/hide value |
y |
Copy to clipboard |
d |
Delete secret |
: |
Open command modal |
h |
Show help |
q |
Quit |
: to open)| Command | Description |
|---|---|
:env |
Generate .env file (plain text) |
:bash |
Export secrets to ~/.bashrc |
:zsh |
Export secrets to ~/.zshrc |
:fish |
Export secrets to fish config |
:json |
Export secrets as JSON |
:clear |
Remove exports from shell profiles |
lazy-locker # Open TUI
lazy-locker status # Check agent status
lazy-locker stop # Stop agent
lazy-locker run <cmd> # Run command with secrets injected
lazy-locker help # Show help
Lazy-Locker includes a security analysis feature to scan your codebase for exposed secrets. This functionality is available as a standalone tool: token-analyzer.
# Install the analyzer
cargo install token-analyzer
# Analyze your project for exposed API keys
token-analyzer API_KEY ./my-project --thorough
# The analyzer detects:
# 🔴 Hardcoded secrets in .env files
# 🟠 Secrets in docker-compose and config files
# 🟢 Logged/printed secrets in source code
See the token-analyzer repository for more details.
Python:
pip install lazy-locker
# or: uv add lazy-locker
JavaScript/TypeScript:
npm install lazy-locker
# or: pnpm add lazy-locker
# or: bun add lazy-locker
See Security Documentation for details.
Contributions are welcome! Please feel free to submit a Pull Request.
git checkout -b feature/amazing-feature)git commit -m 'Add amazing feature')git push origin feature/amazing-feature)This project is licensed under the MIT License - see the LICENSE file for details.
William Derue (@WillIsback)
Made with ❤️ and 🦀