dotnet-secrets-management

Installation
SKILL.md

dotnet-secrets-management

Cloud-agnostic secrets management for .NET applications. Covers the full lifecycle: user secrets for local development, environment variables for production, IConfiguration binding patterns, secret rotation, and managed identity as a production best practice. Includes anti-patterns to avoid (secrets in source, appsettings.json, hardcoded connection strings).

Out of scope: Cloud-provider-specific vault services (Azure Key Vault, AWS Secrets Manager, GCP Secret Manager) -- those are covered by cloud-specific epics. Authentication/authorization implementation (OAuth, Identity) -- see [skill:dotnet-api-security] and [skill:dotnet-blazor-auth]. Cryptographic algorithm selection -- see [skill:dotnet-cryptography]. General Options pattern and configuration sources -- see [skill:dotnet-csharp-configuration].

Cross-references: [skill:dotnet-security-owasp] for OWASP A02 (Cryptographic Failures) and deprecated pattern warnings, [skill:dotnet-csharp-configuration] for Options pattern and configuration source precedence.


Secrets Lifecycle

Environment Secret Source Mechanism
Local dev User secrets dotnet user-secrets CLI, secrets.json outside repo
CI/CD Pipeline variables Injected as environment variables, never in YAML
Staging/Production Environment variables or vault OS-level env vars, managed identity, or vault provider

Principle: Secrets must never exist in the source repository or in any file committed to version control. Each environment tier uses the appropriate mechanism for its trust boundary.

Related skills

More from wshaddix/dotnet-skills

Installs
24
GitHub Stars
23
First Seen
Mar 7, 2026