Features

Built for developers who live in the terminal.

SlickEnv is not a secrets vault with a CLI bolted on. It is a developer tool designed CLI-first, scoped to environment variables, and built to stay out of your way.

Core Capabilities

Everything you need. Nothing you don't.

CLI-First Design

No web dashboard to click through. Every action is a single terminal command, designed to be read at a glance.

End-to-End Encryption

AES-256-GCM client-side encryption. Your secrets are encrypted before they leave your machine. The server never sees plaintext.

Version History & Rollback

Every push creates an immutable snapshot. List versions, compare diffs, and roll back to any previous state instantly.

Conflict Detection

Push rejects if your local .env has diverged from remote. See a clean diff before anything is overwritten.

Metadata Annotations

Tag variables with @description, @required, @sensitive, @format, and @example, right inside your .env file.

Secure Sharing

Share environments with your team through encrypted sync. Generate one-time links or export to .env, JSON, or YAML.

Role-Based Access

Control who can read, write, or admin each environment. Fine-grained permissions per project, per environment.

Push & Pull Sync

One command to push your local .env to the cloud. One command to pull the latest. Conflicts caught before they happen.

Auto .env.example

Export strips sensitive values and generates a clean .env.example that's always in sync with your actual configuration.

Secret Scanner

53 built-in patterns detect AWS keys, Stripe tokens, GitHub PATs, OpenAI keys, database URLs, and 45+ more. Scan files, git history, MCP configs, and AI-generated code in one command.

Git History Cleanup

One command scans your entire commit history across all branches. Guided BFG Repo-Cleaner removes secrets permanently. A pre-commit hook makes sure it never happens again.

AI Safety Layer

Auto-generates .cursorignore, .claudeignore, .copilotignore, and .aiexclude. The slickenv:// reference system means AI coding tools see references — never real values.

Env Linter

11 rules run silently on every push and pull. Catches lowercase keys, duplicates, unquoted spaces, generic names, and missing .env.example entries before they reach remote.

Encrypted Share Links

AES-256-GCM encrypted, one-time self-destructing links. Set expiry, read limit, and optional password protection. Replaces Slack DMs, WhatsApp messages, and email threads.

Coming Soon

The next layer is already mapped out.

These features are planned next. We want the roadmap visible, but we do not want roadmap copy pretending to be shipped functionality.

Planned

Native VS Code extension

Inline secret warnings and one-click fix suggestions directly inside your editor — without switching to the terminal.

Planned

GitHub Action

Automated secret scanning on every pull request. Block merges when critical or high findings are detected.

Planned

Slack and Teams notifications

Alerts for stale secrets, over-shared links, and new critical findings — delivered to the channel where your team already works.

Planned

SAML SSO and on-premise deployment

Enterprise-grade authentication and the option to self-host the full stack on your own infrastructure.

The CLI is the Product

Your terminal, your workflow.

No web dashboard you forgot was open. No browser tabs to manage. SlickEnv lives in your terminal, right next to your code. Every action is a single command. Every output is designed to be read at a glance.

terminal
$ slickenv init
✓ Project linked to "my-app"
$ slickenv push
Encrypting 14 variables...
✓ Pushed v7 — 14 variables, 2 updated
$ slickenv versions
v7 2 min ago 14 vars "Added Stripe keys"
v6 3 hours ago 12 vars "Updated DB config"
v5 yesterday 12 vars "Initial setup"
$ slickenv rollback v5
✓ Rolled back to v5 — .env updated

Smart .env Files

Your .env files, but smarter.

SlickEnv reads and writes standard .env files, but it also understands metadata annotations. Add a comment above any variable and SlickEnv will track it, validate it, and display it in context.

@description@required@sensitive@format@default@example
.env
# @description Stripe secret key for payments
# @required true
# @sensitive true
# @format stripe_secret_key
STRIPE_SECRET_KEY=sk_live_abc123
# @description PostgreSQL connection string
# @required true
# @example postgres://localhost:5432/myapp
DATABASE_URL=postgres://prod:s3cret@db:5432/app

Conflict Detection

Push and pull with confidence.

SlickEnv detects conflicts before they become problems. If your local .env has diverged from the remote version, you will know before anything is overwritten. Review changes one by one, or resolve in bulk.

terminal
$ slickenv push
⚠ Conflict detected in 2 variables:
DATABASE_URL
- postgres://prod-db:5432/myapp
+ postgres://localhost:5432/myapp_dev
REDIS_URL
- redis://prod-cache:6379
+ redis://localhost:6379
? How would you like to resolve?
› Keep local values
Keep remote values
Review one by one
Abort

Team Collaboration

Share environments. Not secrets.

Four ways to share environment configurations, each designed for a different level of trust and access.

Team Sync

Everyone on the team pulls the same environment. Changes are versioned and attributed.

One-Time Share Link

Generate a single-use, time-limited link that expires after one pull or after a set duration.

Export to File

Export your environment to .env, JSON, or YAML and share it however you like.

Role-Based Access

Control who can read, write, or admin each environment. Fine-grained permissions per project.

Three layers. One command.

Most security incidents happen through one of three surfaces. SlickEnv protects all three.

Files (Now)

Secrets hardcoded in source files, config files, Docker files, CI configs, or MCP configs right now. slickenv scan finds them.

slickenv scan
Git History (Past)

Secrets committed months ago and deleted since. Git stores every version of every file. Deleting the file doesn't help. slickenv git scan finds them.

slickenv git scan
AI Tools (Future)

AI coding tools index your entire project directory. .gitignore has zero effect on Cursor or Claude Code. slickenv ai protect fixes this.

slickenv ai protect

How does SlickEnv compare?

SlickEnv is the only tool that covers all three surfaces where secrets leak: current files, git history, and AI coding tools.

CapabilitySlickEnvGitHubDopplerInfisical
Pre-commit secret blocking
Git history scanning + cleanup
AI tool protection (.aiignore)
53-pattern secret scanner
Zero-knowledge encryption~
Encrypted team .env sync
Audit log and drift monitor~~
Free for solo devs~~
See full comparison with all alternatives →

Security

Secure by design, not by configuration.

Security is not an add-on. Every part of SlickEnv is built with encryption, access control, and auditability from the ground up.

AES-256-GCM at Rest

All stored variables are encrypted with AES-256-GCM. Keys are derived per-user, per-project using PBKDF2.

TLS 1.3 in Transit

Every API call is encrypted in transit. No plaintext ever touches the wire.

Masked by Default

Sensitive values are masked in all CLI output. No secrets in your terminal history or logs.

Full Audit Trail

Every push, pull, share, and rollback is logged. Know who changed what and when.

Git History Scanner

Finds secrets committed months ago that .gitignore never caught. Uses git log patterns to surface every exposure in your repo's lifetime.

AI Firewall

.aiignore generation for Cursor, Claude Code, GitHub Copilot, Windsurf, and Continue.dev. What .gitignore does for Git, .aiignore does for AI tools.

Pre-Commit Hook

Blocks secrets at the commit level — before they leave your machine. No account required. Works on GitHub, GitLab, Bitbucket, and self-hosted Git.

Ready to simplify your env workflow?

Get started in under a minute. Free for individual developers.