A universal secret manager CLI for developers that centralizes secrets from multiple providers and prevents secret sprawl.
Teller is a cloud-native secrets management CLI tool that allows developers to centralize and manage secrets from multiple providers like HashiCorp Vault, AWS Secrets Manager, and Google Secret Manager without leaving the command line. It solves the problem of secret sprawl and insecure secret handling by providing a unified interface for fetching, injecting, scanning, and syncing secrets across environments.
Developers and DevOps engineers working in cloud-native environments who need to manage secrets across multiple services and want to avoid hardcoding secrets in scripts, environment files, or shell history.
Developers choose Teller because it consolidates secret management across various providers into a single CLI tool, enhances security by scanning for secret leaks, and integrates seamlessly into development workflows without disrupting existing processes.
Cloud native secrets management for developers - never leave your command line for secrets.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Connects to HashiCorp Vault, AWS Secrets Manager, Google Secret Manager, and more from a single .teller.yml file, eliminating the need for custom scripts per provider.
Injects secrets as environment variables into subprocesses without exposing them in shell history, using commands like `teller run` for safe execution.
Scans codebases for hardcoded secrets and integrates into CI/CD pipelines with `teller scan --error-if-found` to break builds on detection.
Redacts secrets from live logs and outputs using pipes like `tail -f | teller redact`, preventing accidental exposure in real-time.
The .teller.yml file requires defining providers and maps in a verbose format, which can be complex and error-prone for simple secret setups.
Being CLI-only, Teller lacks a GUI, making it less suitable for teams preferring visual tools for secret management or auditing.
Testing the project requires Docker, as noted in the README, adding overhead for contributors or users without Docker access.