Teller is a command-line tool designed to manage secrets and environment variables during development, testing, and application building processes. The tool eliminates the need for custom scripts, hardcoded tokens in shell configuration files, visible exports in command history, and misplaced environment files scattered across workstations. The application integrates with multiple secret management services including HashiCorp Vault, AWS Secrets Manager, Google Secret Manager, and other cloud-based key stores and vaults. Users can configure Teller through a .teller.yml configuration file that defines how secrets should be retrieved and populated. Teller operates by pulling variables from configured cloud providers and vault systems, then populating the current working session with these secrets in various formats. This approach provides a centralized method for secret management that can be implemented individually or as part of team processes and best practices. The tool is available through Homebrew package manager and can be invoked using either the full "teller" command or the shortened "tlr" alias. Installation requires adding the SpectralOps tap repository before installing the package.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
BleachBit is an open-source system cleaning utility that removes temporary files and system artifacts to free disk space and protect user privacy.
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A secure file and drive wiping tool that overwrites data with randomized ASCII characters to prevent data recovery.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.