Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
Quantify your coding - open source plugins for automatic time tracking & insights into your programming. | Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log. |
Fully automatic, with reports via email;Find the time you spend per feature/commit;See time spent in each language;Branch-level stats; File-level stats;Slack integration for team collaboration | Secure Secret Storage: Arbitrary key/value secrets can be stored in Vault. Vault encrypts these secrets prior to writing them to persistent storage, so gaining access to the raw storage isn't enough to access your secrets. Vault can write to disk, Consul, and more.;Dynamic Secrets: Vault can generate secrets on-demand for some systems, such as AWS or SQL databases. For example, when an application needs to access an S3 bucket, it asks Vault for credentials, and Vault will generate an AWS keypair with valid permissions on demand. After creating these dynamic secrets, Vault will also automatically revoke them after the lease is up.;Data Encryption: Vault can encrypt and decrypt data without storing it. This allows security teams to define encryption parameters and developers to store encrypted data in a location such as SQL without having to design their own encryption methods.;Leasing and Renewal: All secrets in Vault have a lease associated with it. At the end of the lease, Vault will automatically revoke that secret. Clients are able to renew leases via built-in renew APIs.;Revocation: Vault has built-in support for secret revocation. Vault can revoke not only single secrets, but a tree of secrets, for example all secrets read by a specific user, or all secrets of a particular type. Revocation assists in key rolling as well as locking down systems in the case of an intrusion. |
Statistics | |
GitHub Stars - | GitHub Stars 33.4K |
GitHub Forks - | GitHub Forks 4.5K |
Stacks 156 | Stacks 816 |
Followers 158 | Followers 802 |
Votes 52 | Votes 71 |
Pros & Cons | |
Pros
Cons
| Pros
|
Integrations | |
| No integrations available | |
Codealike is a service that tracks your activity while you code normally. Once you've installed and signed in in your preferred IDE (Visual Studio, Eclipse or Chrome), the plugin will track, process and send the data to our servers so you can visualize it anytime you want to learn how you work and how to improve through trustworthy data.

Doppler’s developer-first security platform empowers teams to seamlessly manage, orchestrate, and govern secrets at scale.
It centralizes, simplifies and automates the encryption key management process to help minimize risk and reduce operational costs of encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for IBM and non-IBM storage solutions using the OASIS Key Management Interoperability Protocol (KMIP).

A container native solution that strengthens the Trusted Delivery component of container security by integrating secret distribution directly into the container platform.

AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.

Securely store config and manage access in an end-to-end encrypted, auto-syncing desktop app. Connect your apps in minutes in any language with an environment variable and a line or two of code.

Knox is a SaaS (Secrets as a Service) that helps you manage your keys, secrets, and configurations. Start in minutes and close the widest security breach. You cannot keep storing secrets in your git repo or sharing them by email or slack me

Keywhiz is a secret management and distribution service that is now available for everyone. Keywhiz helps us with infrastructure secrets, including TLS certificates and keys, GPG keyrings, symmetric keys, database credentials, API tokens, and SSH keys for external services — and even some non-secrets like TLS trust stores. Automation with Keywhiz allows us to seamlessly distribute and generate the necessary secrets for our services, which provides a consistent and secure environment, and ultimately helps us ship faster.

It is a new data-driven way to truly understand your engineers.It analyzes your codebase from Github, Gitlab, Azure DevOps & Bitbucket to help you bring out the best in your engineers work.

Zero config DORA metrics and engineering intelligence. SOC 2 ready. Setup in 5 minutes. Track performance, not people.