muxi secrets
Secure credential management from the CLI
Add, update, and remove encrypted secrets for your formations. Secrets are stored in secrets.enc and never exposed in logs or environment variables.
Usage
muxi secrets <command> [options]
Commands
| Command | Description |
|---|---|
setup
| Interactive secrets wizard |
set
| Set a secret |
get
| Get a secret value |
list
| List all secrets |
delete
| Delete a secret |
Setup Wizard
muxi secrets setup
Scans formation for required secrets and prompts for each:
Setting up secrets for my-assistant...
Required secrets:
OPENAI_API_KEY (from llm.api_keys)
BRAVE_API_KEY (from mcps.web-search)
Enter OPENAI_API_KEY: ****
Enter BRAVE_API_KEY: ****
✓ Secrets encrypted and saved
Set Secret
muxi secrets set OPENAI_API_KEY
Prompts for value:
Enter OPENAI_API_KEY: ****
✓ Secret saved
Or from environment:
echo $OPENAI_API_KEY | muxi secrets set OPENAI_API_KEY --stdin
Get Secret
muxi secrets get OPENAI_API_KEY
Displays the value (use carefully).
List Secrets
muxi secrets list
Output (keys only):
OPENAI_API_KEY
BRAVE_API_KEY
DATABASE_URL
Delete Secret
muxi secrets delete OLD_KEY
Options
| Flag | Description |
|---|---|
--path <dir>
| Formation directory |
--stdin
| Read value from stdin |
--force
| Overwrite without confirm |
Files
Secrets are stored encrypted:
my-formation/
├── secrets.enc # Encrypted secrets
├── secrets # Template (commit this)
└── .key # Encryption key (never commit!)
Security
- Never commit
.key- Add to.gitignore - Safe to commit
secrets.enc- Encrypted - Keep
secretsupdated - Shows required secrets
Examples
# Run setup wizard
muxi secrets setup
# Set individual secret
muxi secrets set GITHUB_TOKEN
# List all secrets
muxi secrets list
# Delete old secret
muxi secrets delete OLD_API_KEY