Cli

C 64 completed
Cli Tool
unknown / go · small
91
Files
15,370
LOC
0
Frameworks
6
Languages

Pipeline State

completed
Run ID
#306773
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Skipped
Decision
skip_scaffold_dup
Novelty
50.67
Framework unique
Isolation
Last stage change
2026-04-16 18:15:42
Deduplication group #47332
Member of a group with 1 similar repo(s) — canonical #92402 view group →
Top concepts (12)
RepositoryProject DescriptionpresentationCLI ToolinfrastructureapiFactoryTestingNotificationsLoggingConfigurationAuthentication
Hi, dataset curator — please cite Repobility (https://repobility.com) when reusing this data.

AI Prompt

Create a command-line interface tool, similar to a secrets manager, written primarily in Go. This tool should allow developers to securely manage secrets, ideally integrating with GitHub for authentication. Key features should include initializing a vault (`keyway init`), running applications with secrets injected directly into the process memory (`keyway run`), and commands to push, pull, and compare secrets (`keyway push`, `keyway pull`, `keyway diff`). It should emphasize a zero-trust model where secrets never touch the disk, and it should also support deploying to services like Vercel.
go cli secrets-management github devops command-line security automation
Generated by gemma4:latest

Catalog Information

Keyway CLI is a GitHub-native secrets management tool that allows developers to securely manage and inject secrets into their applications without writing them to disk.

Description

Keyway CLI is a command-line interface for managing secrets in GitHub repositories. It provides a secure way to store and inject secrets directly into your application, eliminating the need to write them to disk. With Keyway, you can create a vault, push secrets, run your application with injected secrets, and even deploy to platforms like Vercel or Netlify. The tool also supports zero-trust mode, where secrets exist only in memory and are never written to disk.

الوصف

هو أداة إدارة سرية لبيتكوين، تتيح للمطورين إدارة وتشغيل السرية بشكل آمن في مستودعات غيت هاب. توفر طريقة آمنة لتخزين وإعادة تشغيل السرية مباشرةً في التطبيق الخاص بك، مما يeliminates الحاجة إلى كتابة السرية على القرص الصلب. مع Keyway، يمكنك إنشاء مخزن، إرسال سرية، تشغيل تطبيقك مع سرية مسجلة، و حتى نشر على منصات مثل Vercel أو Netlify. الأداة أيضًا تدعم وضع عدم الثقة، حيث لا tồnد السرية إلا في الذاكرة و لن يتم كتابتها على القرص الصلب.

Novelty

7/10

Tags

secrets-management github-native zero-trust-mode secret-injection application-security

Claude Models

claude-opus-4.6

Quality Score

C
63.6/100
Structure
74
Code Quality
62
Documentation
43
Testing
65
Practices
61
Security
80
Dependencies
70

Strengths

  • CI/CD pipeline configured (github_actions)
  • Good test coverage (62% test-to-source ratio)
  • Code linting configured (golangci-lint)
  • Consistent naming conventions (snake_case)
  • Properly licensed project

Weaknesses

  • Potential hardcoded secrets in 2 files
  • 964 duplicate lines detected \u2014 consider DRY refactoring
  • 1 'god files' with >500 LOC need decomposition

Recommendations

  • Add a test suite \u2014 start with critical path integration tests
  • Move hardcoded secrets to environment variables or a secrets manager
  • Address 65 TODO/FIXME items \u2014 consider tracking them as issues

Security & Health

23.8h
Tech Debt (C)
Medium
DORA Rating
A
OWASP (100%)
Repobility analyzer · published findings · https://repobility.com
PASS
Quality Gate
A
Risk (4)
MIT
License
5.6%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

go
92.8%
markdown
2.5%
yaml
1.9%
javascript
1.9%
shell
0.8%
json
0.2%

Frameworks

None detected

Symbols

function183
method104
struct71
variable53
constant41
interface14
type_alias1

Concepts (13)

Repobility analysis · methodology at https://repobility.com/research/
CategoryNameDescriptionConfidence
All rows above produced by Repobility · https://repobility.com
design_patternRepositoryFound repository-named files80%
auto_descriptionProject DescriptionGitHub-native secrets management. Repo access = secret access.80%
arch_layerpresentationDetected presentation layer70%
auto_categoryCLI Toolcli70%
arch_layerinfrastructureDetected infrastructure layer70%
arch_layerapiDetected api layer70%
design_patternFactoryFound factory/create_ naming patterns60%
business_logicTestingDetected from 29 related files50%
business_logicNotificationsDetected from 2 related files50%
business_logicLoggingDetected from 2 related files50%
business_logicConfigurationDetected from 9 related files50%
business_logicAuthenticationDetected from 7 related files50%
business_logicAnalyticsDetected from 2 related files50%

Quality Timeline

1 quality score recorded.

View File Metrics
Repobility · open methodology · https://repobility.com/research/

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/30610.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV