agent-job-secrets

List, get, or update agent secrets. Use get for OAuth credentials (auto-refreshed on every call). Use set to persist updated credentials back to the event handler.

1,419 stars

Best use case

agent-job-secrets is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

List, get, or update agent secrets. Use get for OAuth credentials (auto-refreshed on every call). Use set to persist updated credentials back to the event handler.

Teams using agent-job-secrets should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/agent-job-secrets/SKILL.md --create-dirs "https://raw.githubusercontent.com/stephengpope/thepopebot/main/templates/skills/agent-job-secrets/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/agent-job-secrets/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How agent-job-secrets Compares

Feature / Agentagent-job-secretsStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

List, get, or update agent secrets. Use get for OAuth credentials (auto-refreshed on every call). Use set to persist updated credentials back to the event handler.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

## Usage

```bash
# List available secrets (null = must fetch, plain = already in env)
node skills/agent-job-secrets/agent-job-secrets.js

# Get a secret value (OAuth credentials are auto-refreshed)
node skills/agent-job-secrets/agent-job-secrets.js get MY_CREDENTIALS

# Set/update a secret (plain string or piped value)
node skills/agent-job-secrets/agent-job-secrets.js set MY_KEY "value"
echo "$UPDATED_CREDENTIALS" | node skills/agent-job-secrets/agent-job-secrets.js set MY_KEY
```

## Notes

- `AGENT_JOB_TOKEN` and `APP_URL` are injected automatically — no setup required
- OAuth credentials show as `null` in the list and must be fetched via `get`
- `get` on an OAuth credential refreshes it and persists the updated token immediately
- Plain secrets are available directly as env vars (e.g. `echo $MY_KEY`)

Related Skills

playwright-cli

1419
from stephengpope/thepopebot

Automate browser interactions, test web pages and work with Playwright tests.

azure-security-keyvault-secrets-java

31392
from sickn33/antigravity-awesome-skills

Azure Key Vault Secrets Java SDK for secret management. Use when storing, retrieving, or managing passwords, API keys, connection strings, or other sensitive configuration data.

azure-keyvault-secrets-ts

31392
from sickn33/antigravity-awesome-skills

Manage secrets using Azure Key Vault Secrets SDK for JavaScript (@azure/keyvault-secrets). Use when storing and retrieving application secrets or configuration values.

Secret ManagementClaude

azure-keyvault-secrets-rust

31392
from sickn33/antigravity-awesome-skills

Azure Key Vault Secrets SDK for Rust. Use for storing and retrieving secrets, passwords, and API keys. Triggers: "keyvault secrets rust", "SecretClient rust", "get secret rust", "set secret rust".

aws-secrets-rotation

31392
from sickn33/antigravity-awesome-skills

Automate AWS secrets rotation for RDS, API keys, and credentials

secrets-management

31392
from sickn33/antigravity-awesome-skills

Secure secrets management practices for CI/CD pipelines using Vault, AWS Secrets Manager, and other tools.

secrets-management

24269
from davila7/claude-code-templates

Secure secrets management practices for CI/CD pipelines using Vault, AWS Secrets Manager, and other tools.

secrets-vault-manager

9958
from alirezarezvani/claude-skills

Use when the user asks to set up secret management infrastructure, integrate HashiCorp Vault, configure cloud secret stores (AWS Secrets Manager, Azure Key Vault, GCP Secret Manager), implement secret rotation, or audit secret access patterns.

env-secrets-manager

9958
from alirezarezvani/claude-skills

Env & Secrets Manager

implementing-secrets-scanning-in-ci-cd

4032
from mukul975/Anthropic-Cybersecurity-Skills

Integrate gitleaks and trufflehog into CI/CD pipelines to detect leaked secrets before deployment

implementing-secrets-management-with-vault

4032
from mukul975/Anthropic-Cybersecurity-Skills

This skill covers deploying HashiCorp Vault for centralized secrets management across cloud environments, including dynamic secret generation for databases and cloud providers, transit encryption, PKI certificate management, and Kubernetes integration. It addresses eliminating hardcoded credentials from application code and CI/CD pipelines by implementing short-lived, automatically rotated secrets.

implementing-hashicorp-vault-dynamic-secrets

4032
from mukul975/Anthropic-Cybersecurity-Skills

Implements HashiCorp Vault dynamic secrets engines for database credentials, AWS IAM keys, and PKI certificates with automatic generation, lease management, and credential rotation to eliminate static secrets in application configurations. Activates for requests involving Vault secrets engine configuration, dynamic database credentials, ephemeral cloud credentials, or automated secret rotation.