Your environment variables contain API keys, database credentials, and payment secrets. We designed SlickEnv so even we cannot read them.
Every variable is encrypted with AES-256-GCM before it leaves your machine. The server stores ciphertext. Keys are derived client-side. This is not marketing language. It means a database breach exposes nothing useful.
SlickEnv ships a 53-pattern secret detection engine that scans files, git history, MCP config files, and AI-generated code. It detects AWS access keys, Stripe secret keys, GitHub tokens, OpenAI keys, Anthropic keys, JWT tokens, database connection strings, PEM private keys, and over 40 more patterns.
Every scan produces a security score from 0–100. Findings are categorised by severity: critical, high, medium, and info. The --ci flag exits with code 1 on critical or high findings, making it easy to block deployments in CI pipelines.
$ slickenv scan --files --git --mcp
✗ STRIPE_SECRET_KEY stripe_live_key (critical) .env:3
✗ AWS_SECRET_KEY found in 3 commits git history
Score: 41/100 — 2 critical, 0 highDeleting a file from git doesn't delete it from history. A secret committed and immediately removed is still present in every clone of your repository. SlickEnv's git protection layer addresses this in three steps:
slickenv git scan searches every commit across all branches for all 53 patternsslickenv git clean guides you through BFG Repo-Cleaner to permanently rewrite historyslickenv git protect installs a pre-commit hook that prevents secrets from ever entering git history againModern AI coding assistants — Cursor, Claude Code, GitHub Copilot, Windsurf, Continue.dev — index your project files to provide context-aware suggestions. By default, this includes your .env file and any file containing credentials. slickenv ai protect generates four ignore files in one command:
.cursorignore — Cursor.claudeignore — Claude Code.copilotignore — GitHub Copilot.aiexclude — Windsurf, Continue.dev, and othersFor maximum protection, the slickenv:// reference system lets you use placeholder references in your code and config files instead of real values. slickenv run resolves them at runtime — the real values exist only in the child process memory and are never written to disk or logged.
If you discover a security vulnerability in SlickEnv, please report it responsibly. We take all reports seriously and will respond within 48 hours.
Email: hello@slickspender.com
Please include a detailed description of the vulnerability, steps to reproduce, and any relevant logs or screenshots. We will acknowledge receipt within 48 hours, provide an initial assessment within 5 business days, and keep you informed of our progress toward a fix.