Integrates with macOS to provide secure secret storage through the system keychain and includes a native menu bar app for managing secret access requests and notifications.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@MCP Secretslist my S3 buckets using {{AWS_ACCESS_KEY}}"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Claude Secrets
A secure secrets management plugin for Claude Code and MCP clients. Enables AI assistants to safely handle credentials with user approval, automatic redaction, and secret capture from command output.
Features
Secret Injection - Use
{{SECRET_NAME}}placeholders in commands to inject secretsSession-Based Permissions - User approves secret access per-session with time-based expiry
Output Redaction - Automatically redacts known secrets and common patterns from output
Secret Capture - Extract secrets from command output (e.g., AWS session tokens) and store for future use
LLM-Friendly Metadata - Descriptions help future LLMs discover and use the right secrets
macOS Menu Bar App - Native notifications and dialogs for secret requests
Encrypted Vault - Secrets stored with Fernet encryption
Installation
One-Line Install (Recommended)
curl -sSL https://raw.githubusercontent.com/henghonglee/claude-secrets/main/install.sh | bashThis automatically:
Installs the package via pipx
Creates the encrypted vault
Installs the Claude Code plugin
Starts the menu bar app
Enables auto-start on login
Manual Installation
pipx install git+https://github.com/henghonglee/claude-secrets.git
ccs initFrom Source
git clone https://github.com/henghonglee/claude-secrets.git
cd claude-secrets
pip install -e .
ccs initQuick Start
# Initialize vault + start menubar + enable auto-start on login
ccs init
# Add a secret with description (helps LLMs understand what it's for)
ccs add AWS_ACCESS_KEY
# Check status
ccs statusThe init command automatically:
Creates the encrypted vault
Installs the Claude Code plugin (via marketplace)
Starts the menu bar app
Enables auto-start on login (macOS)
Plugin-Only Install (if claude-secrets is already installed)
claude plugin marketplace add henghonglee/claude-secrets
claude plugin install claude-secrets@henghonglee-claude-secretsClaude Code Commands
When installed as a plugin:
Command | Description |
| List all available secrets |
| Add a new secret |
| Run a command with secret injection |
MCP Configuration (Non-Plugin)
For Claude Desktop or other MCP clients, add to your configuration:
{
"mcpServers": {
"secrets": {
"command": "ccs",
"args": ["serve"]
}
}
}MCP Tools
run_command
Execute a CLI command with secret injection and output redaction.
{
"command": "aws s3 ls --profile {{AWS_PROFILE}}",
"timeout": 60,
"capture": [
{
"path": "$.Credentials.SecretAccessKey",
"name": "AWS_SESSION_SECRET",
"description": "Temporary AWS secret key from STS. Use with AWS_SESSION_KEY_ID and AWS_SESSION_TOKEN.",
"expires_at": "2024-01-24T12:00:00Z"
}
]
}Parameters:
command- Command with{{SECRET_NAME}}placeholderstimeout- Timeout in seconds (default: 60)capture- Extract secrets from JSON output:path- JSONPath expression (e.g.,$.Credentials.SecretAccessKey)name- Name for the captured secretdescription- LLM-friendly descriptionexpires_at- ISO 8601 expiration timestamp
redact_patterns- Additional regex patterns to redactskip_builtin_patterns- Skip built-in redaction patterns
list_secrets
List available secrets with their descriptions.
{
"tag": "aws"
}Returns:
{
"secrets": [
{
"name": "AWS_ACCESS_KEY",
"description": "AWS access key for production account",
"expires_at": null
}
]
}request_secret
Request the user to add a missing secret via the menu bar app.
{
"name": "GITHUB_TOKEN",
"description": "Personal access token for GitHub API. Needs repo and workflow scopes."
}The menu bar app will show a native macOS dialog prompting the user to enter the secret value.
get_permissions
Get current session permission status for secrets.
How It Works
Client LLM calls to discover available secrets
LLM constructs command with
{{SECRET_NAME}}placeholdersUser approves secret access when prompted (cached for session)
Server injects secrets and executes command
Output is redacted before returning to LLM
Captured secrets are stored with LLM-provided descriptions for future use
Menu Bar App (macOS)
The menu bar app provides:
Server status indicator
List of stored secrets with expiry times
Native dialogs for secret requests
Notifications when secrets are captured or expiring
Start with:
claude-secrets-menubarSecurity Model
Encrypted storage - Vault encrypted with Fernet (AES-128-CBC)
Permission prompts - User must approve each secret's use
Session expiry - Permissions auto-expire (default: 1 hour)
Output redaction - Secrets automatically removed from command output
Audit logging - All secret access logged to
~/.claude-secrets/audit.log
Uninstalling
One-Line Uninstall
curl -sSL https://raw.githubusercontent.com/henghonglee/claude-secrets/main/uninstall.sh | bashManual Uninstall
ccs uninstall # Stops menubar, removes plugin, keeps secrets
pipx uninstall claude-secretsDelete Everything (including secrets)
ccs uninstall --delete-vault
pipx uninstall claude-secretsYour secrets are preserved by default in ~/.claude-secrets/ so you can reinstall later without losing them.
Plugin Structure
claude-secrets/
├── .claude-plugin/
│ ├── plugin.json # Plugin manifest
│ └── marketplace.json # Marketplace manifest (for plugin distribution)
├── .mcp.json # MCP server configuration
├── skills/
│ └── secrets/
│ └── SKILL.md # Teaches Claude when/how to use secrets
├── commands/
│ ├── list.md # /claude-secrets:list command
│ ├── add.md # /claude-secrets:add command
│ └── run.md # /claude-secrets:run command
└── src/
└── claude_secrets/ # Python packageConfiguration
Configuration stored at ~/.claude-secrets/config.json:
{
"session_timeout": 3600
}Set values with:
ccs config set session_timeout 7200Development
# Install dev dependencies
pip install -e ".[dev]"
# Run tests
pytest
# Run with coverage
pytest --cov=claude_secrets
# Test plugin locally
claude --plugin-dir ./License
MIT