Secrets Management
In

Infisical

TypeScriptOpen SourceSecretsSelf-host

Open-source secrets management platform — sync environment variables across teams and infrastructure, with self-host or cloud options.

License

MIT

Language

TypeScript

80
Trust
Strong

Why Infisical?

Teams needing centralized env var management with audit logs and access control

Self-hosting secrets for compliance without paying for Vault or Doppler

Automating secret injection into CI/CD pipelines and Kubernetes

Signal Breakdown

What drives the Trust Score

npm downloads
25k / wk
Commits (90d)
250 commits
GitHub stars
16k ★
Stack Overflow
30 q's
Community
Growing
Weighted Trust Score80 / 100

Download Trend

Last 12 months

Tradeoffs & Caveats

Know before you commit

Solo developers — a .env file and Vercel env vars are sufficient

Enterprises with existing HashiCorp Vault deployments

Pricing

Free tier & paid plans

Free tier

Free: unlimited secrets, 5 members

Paid

Pro: $8/user/mo

Alternative Tools

Other options worth considering

Do
Doppler79Good

Universal secrets manager that syncs environment variables across local dev, CI, and cloud — replace .env files with a single CLI command.

vault
HashiCorp Vault83Strong

Enterprise-grade secrets management and encryption service — dynamic secrets, lease-based access, PKI, and fine-grained policy engine.

Often Used Together

Complementary tools that pair well with Infisical

docker

Docker

DevOps & Infra

93Excellent
View
kubernetes

Kubernetes

DevOps & Infra

99Excellent
View
github-actions

GitHub Actions

DevOps & Infra

50Limited
View

Learning Resources

Docs, videos, tutorials, and courses

Get Started

Repository and installation options

View on GitHub

github.com/Infisical/infisical

npmnpm install @infisical/sdk
pippip install infisical-python

Quick Start

Copy and adapt to get going fast

npm install @infisical/sdk

import { InfisicalClient } from '@infisical/sdk';

const client = new InfisicalClient({ clientId: '...', clientSecret: '...' });
const secrets = await client.listSecrets({ projectId: '...', environment: 'prod' });
console.log(secrets);

Community Notes

Real experiences from developers who've used this tool