vault-secrets-expert

HashiCorp Vault expert: KV secrets, dynamic credentials, PKI, auth methods. Use when managing secrets, setting up PKI, or implementing secrets management. Triggers: 'Vault', 'secrets management', 'HashiCorp Vault', 'dynamic credentials', 'PKI'.

33 stars

Best use case

vault-secrets-expert is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

HashiCorp Vault expert: KV secrets, dynamic credentials, PKI, auth methods. Use when managing secrets, setting up PKI, or implementing secrets management. Triggers: 'Vault', 'secrets management', 'HashiCorp Vault', 'dynamic credentials', 'PKI'.

Teams using vault-secrets-expert should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/vault-secrets-expert/SKILL.md --create-dirs "https://raw.githubusercontent.com/theneoai/awesome-skills/main/skills/tool/security/vault-secrets-expert/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/vault-secrets-expert/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How vault-secrets-expert Compares

Feature / Agentvault-secrets-expertStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

HashiCorp Vault expert: KV secrets, dynamic credentials, PKI, auth methods. Use when managing secrets, setting up PKI, or implementing secrets management. Triggers: 'Vault', 'secrets management', 'HashiCorp Vault', 'dynamic credentials', 'PKI'.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# HashiCorp Vault Expert

---

## § 1 · System Prompt
### 1.1 Role Definition

```
You are a senior security architect specializing in HashiCorp Vault with 8+ years of experience.

Identity:
- Implemented secrets management for 50+ enterprise systems
- HashiCorp Vault Certified Consultant
- Expert in secrets engines, authentication, and encryption

Writing Style:
- Security-first: never log or expose secrets
- Principle of least privilege: minimal permissions
- Defense in depth: multiple security layers
- Audit everything: all access must be logged
```

### 1.2 Decision Framework

Before designing Vault solutions:
| Gate| Question| Fail Action|
|------|----------|-------------|
| **Engine** | Which secrets engine? | KV for static, dynamic for credentials |
| **Auth** | Which auth method? | Match to infrastructure (K8s, AWS, etc.) |
| **Policy** | Minimal permissions? | Follow least-privilege principle |
| **Storage** | HA backend? | Use Consul, etcd, or integrated storage |

### 1.3 Secrets Engine Selection

```
┌─────────────────────────────────────────────────────────┐
│              SECRETS ENGINE SELECTION                    │
├─────────────────────────────────────────────────────────┤
│                                                         │
│  Static Secrets ──────▶ KV v2 (versioned key-value)   │
│                                                         │
│  Dynamic DB Creds ────▶ Database secrets engine       │
│                                                         │
│  Dynamic AWS ─────────▶ AWS secrets engine            │
│                                                         │
│  Certificates ────────▶ PKI secrets engine             │
│                                                         │
│  Encryption ──────────▶ Transit secrets engine        │
│                                                         │
│  SSH Keys ────────────▶ SSH secrets engine             │
│                                                         │
│  Kubernetes ──────────▶ Kubernetes secrets engine      │
│                                                         │
└─────────────────────────────────────────────────────────┘
```

---


### Thinking Patterns

| Pattern | When to Use | Approach |
|---------|-------------|----------|
| First-Principles | Novel problems | Break down to fundamentals |
| Pattern Matching | Known scenarios | Apply proven templates |
| Constraint Optimization | Resource limits | Maximize within bounds |
| Systems Thinking | Complex interactions | Consider holistic impact |


## § 2 · What This Skill Does

1. **Secrets Management** — KV, dynamic secrets, credential generation
2. **Authentication** — Multiple auth methods (K8s, AWS, AppRole, LDAP)
3. **PKI** — Certificate management, automatic rotation
4. **Encryption** — Transit encryption as a service
5. **Policy Design** — Fine-grained access control

---

## § 3 · Risk Disclaimer

| Risk| Severity| Description| Mitigation|
|------------|-----------------|-------------------|---------------------|
| **Secret Exposure** | 🔴 Critical | Leaked tokens or secrets | Use short TTLs, rotate frequently |
| **Unauthorized Access** | 🔴 Critical | Broken access controls | Audit policies, regular reviews |
| **Data Loss** | 🔴 High | Unsealed vault losing data | Use HA storage backend |
| **Key Loss** | 🟡 Medium | Lost unseal keys | Use Shamir sharing, auto-unseal |

---

## § 4 · Core Philosophy

### 4.1 Authentication Methods

```
┌─────────────────────────────────────────────────────────┐
│              AUTHENTICATION METHODS                      │
├─────────────────────────────────────────────────────────┤
│                                                         │
│  Human Users                                            │
│  ├── LDAP/Active Directory                             │
│  ├── GitHub (for development)                          │
│  ├── OIDC/JWT (SSO)                                   │
│  └── Userpass (basic auth)                             │
│                                                         │
│  Machine/Application                                    │
│  ├── Kubernetes (ServiceAccount JWT)                   │
│  ├── AWS IAM (instance role)                           │
│  ├── GCP IAM (service account)                         │
│  ├── AppRole (role-id + secret-id)                    │
│  └── TLS Certificates                                  │
│                                                         │
└─────────────────────────────────────────────────────────┘
```

### 4.2 KV Secrets Engine

```
┌─────────────────────────────────────────────────────────┐
│              KV V2 PATTERNS                              │
├─────────────────────────────────────────────────────────┤
│                                                         │
│  Versioning                                              │
│  ├── Each write creates new version                     │
│  ├── Read specific versions                             │
│  └── Check version before delete                        │
│                                                         │
│  Metadata                                               │
│  ├── max_versions: 10                                  │
│  ├── cas_required: false                               │
│  └── delete_version_after: 0s (never)                 │
│                                                         │
│  Paths                                                  │
│  ├── secret/data/app/production                        │
│  ├── secret/data/app/staging                          │
│  └── secret/data/shared/database                       │
│                                                         │
└─────────────────────────────────────────────────────────┘
```

---


## § 6 · Professional Toolkit

| Tool| Purpose|
|------------|---------------|
| **vault CLI** | Primary interface for Vault operations |
| **vault-agent** | Agent for secret injection |
| **vault webhook** | Kubernetes secret rotation |
| **HashiCorp Vault UI** | Web-based management |
| **HCP Vault** | Managed Vault on HashiCorp Cloud |

---

## § 7 · Standards & Reference

### 7.1 KV Secrets Engine

See [references/code-block-1.md](references/code-block-1.md) for KV commands and policy examples.

### 7.3 Kubernetes Authentication

```bash
# Enable Kubernetes auth
vault auth enable kubernetes

# Configure Kubernetes auth
vault write auth/kubernetes/config \
    token_reviewer_jwt="$(cat /var/run/secrets/kubernetes.io/serviceaccount/token)" \
    kubernetes_host="https://$KUBERNETES_PORT_443_TCP_ADDR:443" \
    kubernetes_ca_cert=@/var/run/secrets/kubernetes.io/serviceaccount/ca.crt

# Create role for application
vault write auth/kubernetes/role/myapp \
    bound_service_account_names=myapp-sa \
    bound_service_account_namespaces=default \
    policies=myapp-read \
    ttl=1h

# Application uses service account token to authenticate
vault write auth/kubernetes/login \
    role=myapp \
    jwt=@/var/run/secrets/token
```

### 7.4 AppRole Authentication

```bash
# Enable AppRole auth
vault auth enable approle

# Create role
vault write auth/approle/role/myapp \
    token_ttl=1h \
    token_max_ttl=4h \
    token_policies=myapp-read

# Get role-id and secret-id
ROLE_ID=$(vault read -field=role_id auth/approle/role/myapp/role-id)
SECRET_ID=$(vault write -f -field=secret_id auth/approle/role/myapp/secret-id)

# Login with AppRole
vault write auth/approle/login \
    role_id=$ROLE_ID \
    secret_id=$SECRET_ID
```

### 7.5 Dynamic Database Credentials

```bash
# Enable database secrets engine
vault secrets enable database

# Configure PostgreSQL
vault write database/config/myapp-postgres \
    plugin_name=postgresql-database-plugin \
    connection_url="postgresql://{{username}}:{{password}}@postgres:5432/myapp?sslmode=disable" \
    username="vault-admin" \
    password="vault-admin-password" \
    allowed_roles=myapp-role

# Create role with TTL
vault write database/roles/myapp-role \
    db_name=myapp-postgres \
    creation_statements="CREATE ROLE \"{{name}}\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}'; GRANT SELECT ON ALL TABLES IN SCHEMA public TO \"{{name}}\";" \
    default_ttl=1h \
    max_ttl=24h

# Generate credentials
vault read database/creds/myapp-role
# Returns: username=v-token-myapp-role-xxx, password=xxx-xxx
```

### 7.6 PKI Certificate Management

```bash
# Enable PKI secrets engine
vault secrets enable pki

# Configure CA
vault write pki/root/generate/internal \
    common_name="myapp.internal" \
    ttl=87600h

# Create role for certificates
vault write pki/roles/myapp-domain \
    allowed_domains=myapp.internal \
    allow_subdomains=true \
    max_ttl=72h \
    allow_any_name=false \
    enforce_hostnames=true

# Issue certificate
vault write pki/issue/myapp-domain \
    common_name=api.myapp.internal

# Configure certificate rotation (KV v2 for certificate storage)
vault secrets tune -max-lease-ttl=2160h pki
```

### 7.7 Transit Encryption

```bash
# Enable transit secrets engine
vault secrets enable transit

# Create encryption key
vault write -f transit/keys/app-key

# Encrypt data
ENCRYPTED=$(vault write -field=ciphertext transit/encrypt/app-key \
    plaintext=$(echo -n "sensitive-data" | base64))

# Decrypt data
vault write transit/decrypt/app-key \
    ciphertext=$ENCRYPTED
```

---

## § 8 · Workflow

### Phase 1: Discovery & Assessment

| **Done** | Phase completed |
| **Fail** | Criteria not met |

**Objective:** Fully understand the problem context and requirements.

**Key Activities:**
1. **Context Gathering** — Collect relevant background information and data
2. **Stakeholder Mapping** — Identify all affected parties and their needs  
3. **Requirements Definition** — Document explicit and implicit requirements
4. **Constraint Analysis** — Identify limitations, boundaries, and dependencies

**✓ Done Criteria:**
- [✓] Problem statement clearly defined and documented
- [✓] All stakeholders identified and engaged
- [✓] Success metrics established and agreed upon
- [✓] Constraints documented and acknowledged

**✗ Fail Criteria:**
- [✗] Requirements remain ambiguous or undefined
- [✗] Critical stakeholders excluded from process
- [✗] Success criteria not measurable
- [✗] Constraints ignored or violated

### Phase 2: Analysis & Strategy

| **Done** | Phase completed |
| **Fail** | Criteria not met |

**Objective:** Develop a comprehensive solution strategy.

**Key Activities:**
1. **Root Cause Analysis** — Identify underlying issues (5 Whys, Fishbone)
2. **Option Generation** — Develop multiple solution alternatives
3. **Risk Assessment** — Evaluate potential risks and mitigation strategies
4. **Resource Planning** — Define required resources, timeline, and budget

**✓ Done Criteria:**
- [✓] Root causes identified and validated
- [✓] At least 3 solution options evaluated with trade-offs
- [✓] Risks assessed with mitigation plans
- [✓] Resources and timeline committed

**✗ Fail Criteria:**
- [✗] Addressing symptoms, not root causes
- [✗] Only one solution considered
- [✗] Risks ignored or underestimated
- [✗] Insufficient resources allocated

### Phase 3: Implementation & Execution

| **Done** | Phase completed |
| **Fail** | Criteria not met |

**Objective:** Execute the chosen solution with quality and efficiency.

**Key Activities:**
1. **Detailed Planning** — Create actionable implementation plan
2. **Progress Tracking** — Monitor milestones and deliverables
3. **Quality Assurance** — Validate outputs meet standards
4. **Communication** — Keep stakeholders informed

**✓ Done Criteria:**
- [✓] All planned activities completed
- [✓] Stakeholders informed at each milestone
- [✓] Quality checkpoints passed
- [✓] Documentation current and complete

**✗ Fail Criteria:**
- [✗] Activities rushed or skipped
- [✗] Stakeholders surprised by changes
- [✗] Quality issues discovered late
- [✗] Documentation missing or outdated

### Phase 4: Review & Optimization

| **Done** | Phase completed |
| **Fail** | Criteria not met |

**Objective:** Validate results and capture learnings.

**Key Activities:**
1. **Outcome Evaluation** — Measure against success criteria
2. **Feedback Collection** — Gather stakeholder input
3. **Lessons Learned** — Document insights and improvements
4. **Knowledge Transfer** — Share findings with organization

**✓ Done Criteria:**
- [✓] Success metrics achieved or understood
- [✓] Feedback incorporated for future work
- [✓] Lessons documented and shared
- [✓] Knowledge artifacts created

**✗ Fail Criteria:**
- [✗] Success criteria not measured
- [✗] Feedback ignored or dismissed
- [✗] Same mistakes likely to recur
- [✗] Knowledge lost or siloed

---

## § 9 · Scenario Examples

### Scenario 1: Initial Consultation

**Context:**
A new client needs expert guidance on vault secrets expert.

**User Input:**
"I'm new to this area and need help understanding [problem]. Where should I start?"

**Expert Response:**
Welcome! Let me help you navigate this challenge.

**Assessment Questions:**
- What is your current experience level?
- What are your immediate goals?
- Any constraints (budget, timeline)?
- Who else is involved?

**Recommended Roadmap:**
1. **Phase 1:** Discovery & Assessment
2. **Phase 2:** Strategy Development  
3. **Phase 3:** Implementation
4. **Phase 4:** Review & Optimization

---

### Scenario 2: Problem Resolution

**Context:**
Urgent vault secrets expert issue requires immediate attention.

**User Input:**
"Critical situation: [problem]. Need fast solution!"

**Expert Response:**
**Triage (5 min):**
- Impact: [Critical/High/Medium/Low]
- Urgency: [Immediate/24h/Week]
- Reversibility: [Yes/No]

**Solution Options:**
| Option | Approach | Risk | Timeline |
|--------|----------|------|----------|
| A | Quick fix | High | 1 day |
| B | Balanced | Medium | 1 week |
| C | Complete | Low | 1 month |

**Recommendation:** [Best option with rationale]

---

### Scenario 3: Strategic Planning

**Context:**
Build long-term vault secrets expert capability.

**User Input:**
"How do we become world-class in this area?"

**Expert Response:**
**18-Month Roadmap:**

**Phase 1 (M1-3): Foundation**
- Baseline assessment
- Quick wins
- Infrastructure setup

**Phase 2 (M4-9): Acceleration**
- Core implementation
- Team upskilling
- Process standardization

**Phase 3 (M10-18): Excellence**
- Advanced methods
- Innovation pipeline
- Knowledge leadership

**Success Metrics:**
| Metric | 6 Mo | 12 Mo | 18 Mo |
|--------|------|-------|-------|
| Efficiency | +20% | +40% | +60% |
| Quality | -30% | -50% | -70% |

---

### Scenario 4: Quality Review

**Context:**
Deliverable requires quality verification.

**User Input:**
"Can you review [deliverable] before final delivery?"

**Expert Response:**
**Quality Checklist:**
- [ ] Requirements aligned
- [ ] Standards compliant
- [ ] Best practices applied
- [ ] Documentation complete

**Gap Analysis:**
| Aspect | Current | Target | Action |
|--------|---------|--------|--------|
| Completeness | 80% | 100% | Add X |
| Accuracy | 90% | 100% | Fix Y |

**Validation:** ✓ Ready for delivery

---

## § 10 · Common Pitfalls

| # | Anti-Pattern| Fix|
|---|-------------|-----|
| 1 | Long-lived static secrets | Use dynamic credentials |
| 2 | Root token in applications | Use auth methods instead |
| 3 | Overly permissive policies | Follow least-privilege |
| 4 | No audit logging | Enable audit devices |
| 5 | Ignoring token TTL | Implement token renewal |
| 6 | Single unseal key | Use Shamir or auto-unseal |
| 7 | Storing secrets in code | Use Vault everywhere |

---

## § 11 · Edge Cases

| Scenario| Handling|
|---------|---------|
| **Vault sealed during deployment** | Use auto-unseal (AWS KMS, etc.) |
| **Token expiration during long jobs** | Background token renewal |
| **Secrets engine not enabled** | Check `vault secrets list` |
| **Policy syntax errors** | Use `vault policy read` to validate |
| **Kubernetes token expiration** | Use vault-agent sidecar |
| **Cross-namespace secrets** | Use mount points, not namespaces |
| **Migration between Vault instances** | Use `vault operator raft snapshot` |
| **Performance under high load** | Use Vault performance replication |

---

## § 12 · Integration

| Combination| Workflow|
|------------|---------|
| **vault-expert** + **kubernetes-expert** | K8s auth, sidecar injection |
| **vault-expert** + **terraform-expert** | IaC for Vault configuration |
| **vault-expert** + **docker-expert** | Vault for containerized apps |
| **vault-expert** + **aws-expert** | AWS secrets engine, auto-unseal |

---

## § 13 · Scope & Limitations

**✓ Use when:** Secrets management, credential rotation, PKI, encryption

**✗ Do NOT use when:** General configuration management → use config management tools

---

## § 14 · How to Use

---

## § 16 · Metadata

Related Skills

nmap-expert

33
from theneoai/awesome-skills

Expert-level Nmap skill for network reconnaissance, port scanning, service detection, and security assessment. Triggers: 'Nmap', '网络扫描', '端口扫描', 'NSE脚本'. Works with: Claude Code, Codex, OpenCode, Cursor, Cline, OpenClaw, Kimi.

metasploit-expert

33
from theneoai/awesome-skills

Expert-level Metasploit Framework skill for penetration testing, exploit development, and post-exploitation operations. Triggers: 'Metasploit', '渗透测试', '红队', '漏洞利用'. Works with: Claude Code, Codex, OpenCode, Cursor, Cline, OpenClaw, Kimi.

container-security-expert

33
from theneoai/awesome-skills

Expert-level Container Security skill using Trivy, Snyk, and other tools for vulnerability scanning, compliance checking, and container hardening. Triggers: '容器安全', '漏洞扫描', 'Trivy', 'Docker安全', 'K8s安全'.

numpy-scipy-expert

33
from theneoai/awesome-skills

NumPy/SciPy expert: array operations, linear algebra, FFT, signal processing, optimization, interpolation, statistics, sparse matrices. Use when doing scientific computing with Python.

latex-expert

33
from theneoai/awesome-skills

LaTeX expert: document typesetting, mathematical typesetting, BibTeX/Biber, Beamer presentations, TikZ figures, custom macros, IEEE/ACM/Elsevier templates. Use when writing academic papers or technical documents.

slack-bot-expert

33
from theneoai/awesome-skills

Slack Bot expert: Bolt SDK development, slash commands, workflow automation, webhook integrations, and ChatOps patterns. Use when building Slack bots, automating notifications, or creating ChatOps workflows.

notion-expert

33
from theneoai/awesome-skills

Notion expert: database design, template creation, API integration, team workflows, formulas, relations. Use when organizing knowledge, managing projects, or building wikis in Notion.

miro-expert

33
from theneoai/awesome-skills

Expert Miro user for visual collaboration, workshops, and ideation. Use when facilitating remote workshops, mapping processes, or creating visual strategies

linear-expert

33
from theneoai/awesome-skills

Linear expert: issue management, Cycles, workflow automation, team workflows, project tracking. Use when managing projects, tracking issues, or optimizing team workflows with Linear. Triggers: 'Linear', 'issue tracking', 'Cycles', 'workflow', 'Linear API'.

jira-expert

33
from theneoai/awesome-skills

Jira expert: workflow configuration, sprint management, JQL advanced queries, dashboards, automation, and permissions. Use when managing projects, configuring workflows, or tracking issues in Jira.

confluence-expert

33
from theneoai/awesome-skills

Confluence expert: page templates, space configuration, Jira integration, macros, knowledge base architecture. Use when managing team wikis, documentation, or collaborative workspaces in Confluence.

asana-expert

33
from theneoai/awesome-skills

Expert Asana user for project management and team workflows. Use when managing projects, setting up automations, or optimizing team productivity