Skip to main content

A CLI tool to whisper your secrets between secure vault and your local environment

Project description

Whispr

Downloads Coverage Status

Sharfer logo (light)

Safely inject secrets into your app's environment from your favorite secret vault (Ex: AWS Secrets Manager, Azure Key Vault etc.).

Whispr uses keys (with empty values) specified in a .env file and fetches respective secrets from a vault, and sets them as environment variables before launching an application.

Install whispr easily with pip!

pip install whispr

Key Features of Whispr:

  • Safe Secret Injection: Fetch and inject secrets from your desired vault using HTTPS, SSL encryption, strict CERT validation.
  • Just In Time (JIT) Privilege: Set environment variables for developers only when they're needed.
  • Secure Development: Eliminate plain-text secret storage and ensure a secure development process.
  • Customizable Configurations: Configure project-level settings to manage multiple secrets for multiple projects.
  • No Custom Scripts Required: Whispr eliminates the need for custom bash scripts or cloud CLI tools to manage secrets, making it easy to get started.
  • Easy Installation: Cross-platform installation with PyPi.
  • Generate Random Sequences for key rotation: Whispr can generate crypto-safe random sequences with a given length. Great for secret rotation.

Supported Vault Technologies:

  1. AWS Secrets Manager
  2. AWS SSM Parameter Store
  3. Microsoft Azure Key Vault
  4. Google Cloud Secret Manager

Supported-vaults

Why use Whispr ?

The MITRE ATT&CK Framework Tactic 8 (Credential Access) suggests that adversaries can exploit plain-text secrets and sensitive information stored in files like .env. It is essential to avoid storing sensitive information in unencrypted files. To help developers, Whispr can safely fetch and inject secrets from a vault into the app environment or pass them as standard input just in time. This enables developers to securely manage credentials and mitigate advisory exploitation tactics.

In simple terms, you can store your secrets in AWS Secrets Manager/Parameter Store, create an empty .env file with keys mapped to cloud vault secret, then inject those mapped secrets into your program's environment.

Getting Started

Installing Whispr

To get started with latest version of Whispr, simply run:

pip install -U whispr

Configuring Your Project

Step 1: Initialize Whispr

Run whispr init <vault_type> in your terminal to create a whispr.yaml file in your project root. This file will store your configuration settings.

The available vault types are: aws, azure, and gcp.

Example whispr.yaml contents (For: AWS):

env_file: '.env'
secret_name: <your_secret>
vault: aws
type: secrets-manager

This default configuration will inject fetched secrets into os.environ of main process.

For AWS SSM parameter store, the same config looks like this:

env_file: '.env'
secret_name: <your_secret>
vault: aws
type: parameter-store

If your app instead want to receive secrets as STDIN arguments, use no_env: true field. This is a secure way than default control but app now should parse arguments itself.

env_file: '.env'
secret_name: <your_secret>
vault: aws
type: parameter-store
no_env: true # Setting true will send KEY1=VAL1 secret pairs as command args

See whispr.yaml.example for configuration related to other supported vault types.

Setting Up Your Injectable Secrets

Step 2: Create or Configure a Secret File

Create a new .env file with empty values for your secret keys. For example:

POSTGRES_USERNAME=
POSTGRES_PASSWORD=

Note: You can also control filename with env_file key in your whispr.yaml.

Step 3: Authenticating to Your Vault (Ex:AWS)

  • Authenticate to AWS using Short-term credentials.
  • Alternatively, set temporary AWS credentials using a config file or environment variables.

Note: Use respective authentication methods for other vaults.

Launch any Application using Whispr (Requires a configuration file: whispr.yaml)

In contrary to programmatic access, if you want to run a script/program do: whispr run '<your_app_command_with_args>' (mind the single quotes around command) to inject your secrets before starting the subprocess.

Examples:

whispr run 'python main.py' # Inject secrets and run a Python program
whispr run 'node server.js --threads 4' # Inject secrets and run a Node.js express server
whispr run 'django manage.py runserver' # Inject secrets and start a Django server
whispr run '/bin/sh ./script.sh' # Inject secrets and run a custom bash script. Script should be permitted to execute
whispr run 'semgrep scan --pro' # Inject Semgrep App Token and scan current directory with Semgrep SAST tool.

Whispr comes with handy utilities like:

  1. Audit a secret from vault
# Also equivalent to whispr secret get --vault=aws --secret=my_secret --region=us-east-1
whispr secret get -v aws -s my_secret -r us-east-1
  1. Generate a crypto-safe random sequences for rotated secrets
# Also equivalent to whispr secret gen-random --length=16 --exclude='*/^'
whispr secret gen-random -l 16 -e '*/^'

Programmatic access of Whispr (Doesn't require a configuration file)

Instead of using Whispr as an execution tool, a Python program can programmatically inject secrets from a vault and launch a sub-process:

pip install whispr

Then from Python code you can import important functions like this:

from whispr.utils.vault import fetch_secrets
from whispr.utils.process import execute_command

# Assuming there is a AWS parameter store secret with name: my/secret with JSON-like string with values:
# '{"MY_DB_PASSWORD": "random_string"}'

config = {
  "vault": "aws",
  "secret_name": "my/secret",
  "type": "parameter-store"
  "region": "us-west-2"
}

secrets = fetch_secrets(config)

# Create a subprocess of a shell command/app with secrets.
command = "printenv"
# Environment list will have MY_DB_PASSWORD=random_string
cp = execute_command(command.split(), no_env=False, secrets=secrets) # cp is CompletedProcess object.

command = "sh script.sh"
# script.sh will have access to env var MY_DB_PASSWORD
# The injected secrets are cleaned from environment after script execution
cp = execute_command(command.split(), no_env=False, secrets=secrets) # cp is CompletedProcess object.

That's it. This is a programmatic equivalent to the tool usage which allows programs to fetch secrets from vault at run time.

TODO

Support:

  • Bitwarden Vault
  • HashiCorp Vault
  • 1Password Vault
  • K8s secret patching
  • Container patching (docker)
  • Increased test coverage

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

whispr-0.8.0.tar.gz (150.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

whispr-0.8.0-py3-none-any.whl (17.4 kB view details)

Uploaded Python 3

File details

Details for the file whispr-0.8.0.tar.gz.

File metadata

  • Download URL: whispr-0.8.0.tar.gz
  • Upload date:
  • Size: 150.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for whispr-0.8.0.tar.gz
Algorithm Hash digest
SHA256 3bb2ec51fc232ded53a9dd5c89ff1e8088aa5cf43db4419fc3871c9ff68ab566
MD5 7e4a0d919a2f8fb76f73f7796c1ac692
BLAKE2b-256 a3346bb320665615430567e5df85eb546a79a55eb8b69767f47a3210f206a044

See more details on using hashes here.

Provenance

The following attestation bundles were made for whispr-0.8.0.tar.gz:

Publisher: release.yml on cybrota/whispr

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file whispr-0.8.0-py3-none-any.whl.

File metadata

  • Download URL: whispr-0.8.0-py3-none-any.whl
  • Upload date:
  • Size: 17.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for whispr-0.8.0-py3-none-any.whl
Algorithm Hash digest
SHA256 6e482b5ff1ab813692f65cdbbc8805be7558f409d3cbfaf6eecbb7404e3e446f
MD5 e6c509800a0c492fc86f505c34db1ff9
BLAKE2b-256 14b74c3243b86c7512ab410c420ae2f51a7d584b5b4cad8ef6233ff73191de35

See more details on using hashes here.

Provenance

The following attestation bundles were made for whispr-0.8.0-py3-none-any.whl:

Publisher: release.yml on cybrota/whispr

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page