varlock.dev

137 posts

varlock.dev banner
varlock.dev

varlock.dev

@varlockdev

Building the future of configuration for humans and non-humans

The internet Katılım Şubat 2024
234 Takip Edilen231 Takipçiler
kapilansh
kapilansh@kapilansh_twt·
how do teams actually share .env variables securely because the options I see are - Slack DM (terrible) - email (worse) - shared Notion doc (somehow even worse) - 1Password or similar - something I'm missing
English
1.1K
20
1.6K
445K
varlock.dev retweetledi
commit
commit@commitvc·
@tambo_ai @InsForge_dev @agentscope_ai #32 Eigent AI ships the open-source cowork desktop for multi-agent productivity, a local and free alternative to cloud-based platforms @Eigent_AI #31 DMNO builds Varlock, AI-safe .env files with schemas for agents and secrets for humans @varlockdev
English
1
1
5
113
varlock.dev retweetledi
Shubham Sinha
Shubham Sinha@xinhash·
@DhravyaShah portless, varlock, agent-browser has made dev a lot simpler
English
0
1
3
391
varlock.dev retweetledi
Louis Lafont
Louis Lafont@louislafont·
.@varlockdev is amazing. Please run "varlock encrypt --file .env" on your files.
English
0
1
2
109
Wilson Wilson
Wilson Wilson@euboid·
I deleted all our .env files from our disc and moved everything to @infisical Wish I did it sooner. Now... - Secrets never touch disk - Secrets auto-shared between developers - Edit in one place, propagate to prod, GitHub actions, staging env etc
Wilson Wilson tweet media
English
24
17
269
26.8K
John A Hathaway
John A Hathaway@Hathaway_JA·
@theozero @leodev So Idk if I'll ever actually need varlock, but that is the dopest site i've seen in a hot minute.
English
1
0
2
19
Leo
Leo@leodev·
All you need to make any project:
Leo tweet media
English
67
17
882
105.9K
varlock.dev retweetledi
Jeff NH
Jeff NH@Reardon_Steel·
@zodchiii Go varlock + self-hosted Infisical. No excuse for leaving secrets in .env and trusting tool to pinkyswear it's won't look. Reduces the risk of AI seeing secrets or humans accidentally committing. Not perfect. (runtime agent exposure, centralized attack point) - helps a lot.
English
0
1
8
1.5K
Feross
Feross@feross·
RT @feross: A brand-squatting npm package impersonating TanStack shipped malicious versions that exfiltrate environment variables from developers’ machines during install. We spoke to @tannerlinsley, creator of @tan_stack, who confirmed that the maintainer of the unscoped tanstack…
English
1
2
18
3.5K
Ben Vinegar
Ben Vinegar@bentlegen·
🇨🇦 I'm *finally* visiting Vancouver in 2 weeks for Web Summit – will be speaking too Anyone want to meet up and talk coding agents, @modemdev, developer tools, etc?
English
18
0
58
4.3K
varlock.dev retweetledi
Theo Ephraim
Theo Ephraim@theozero·
HUGE varlock@v1 update featuring built-in local encryption via native binaries. No extra setup, and you get native DX to decrypt using biometrics. This is for local git-ignored values, and acts as foundation for future caching + team vaults. Get EVERY secret out of plaintext!
Theo Ephraim tweet media
English
3
1
8
388
Peter Cruckshank
Peter Cruckshank@PeteCapeCod·
I kinda don't wanna do more Varlock today. But I totally missed a file with secrets, soooooooo Looks like I'm doing more varlock today 😅
English
1
0
0
60
varlock.dev retweetledi
Ben Vinegar
Ben Vinegar@bentlegen·
Congrats @syntaxfm on 1000 episodes! 🤯 Huge achievement for a Canadian podcast 🇨🇦
Ben Vinegar tweet media
English
6
8
126
21.9K
varlock.dev retweetledi
Theo Ephraim
Theo Ephraim@theozero·
Introducing bumpy 🐸 - a new version/release/changelog tool (carefully crafted slop fork of changesets 🦋) Fixes 100s of open issues, much simpler, more flexible. We use it to release @varlockdev and 25+ linked plugins/libs. bumpy.varlock.dev
English
0
1
3
246