azure-keyvault-secrets-ts
Manage Azure Key Vault secrets securely
Storing application secrets in code creates security risks. This skill enables secure secret management using Azure Key Vault with proper authentication and encryption.
Download the skill ZIP
Upload in Claude
Go to Settings → Capabilities → Skills → Upload skill
Toggle on and start using
Test it
Using "azure-keyvault-secrets-ts". Get the secret 'MySecret' from Key Vault
Expected outcome:
Secret retrieved successfully: MySecret (version: a1b2c3d4). Value length: 32 characters. Content type: application/json. Expires: 2025-12-31.
Using "azure-keyvault-secrets-ts". List all secrets in the vault
Expected outcome:
Found 5 secrets: DatabaseConnectionString, ApiKey, JwtSigningKey, SmtpPassword, StorageAccountKey. All secrets are enabled. 2 secrets expire within 30 days.
Using "azure-keyvault-secrets-ts". Rotate the key 'EncryptionKey' manually
Expected outcome:
Key rotated successfully: EncryptionKey. New version: e5f6g7h8. Key type: RSA. Key size: 2048 bits. Rotation completed at 2026-02-25T00:22:36Z.
Security Audit
SafeAll static analysis findings are false positives. The scanner incorrectly flagged markdown documentation code blocks as executable code. The skill uses Azure SDK patterns correctly with DefaultAzureCredential, environment-based configuration, and industry-standard cryptographic algorithms (RSA-OAEP, RS256, P-256). No malicious patterns detected.
Risk Factors
🌐 Network access (2)
🔑 Env variables (1)
Quality Score
What You Can Build
Secure Application Configuration
Store database connection strings, API keys, and service credentials in Key Vault instead of environment variables or config files.
Cryptographic Key Management
Generate and manage RSA or elliptic curve keys for encryption and digital signatures with automatic rotation policies.
Secrets Rotation Automation
Implement automated secret rotation with expiration dates and access policies to reduce credential exposure risk.
Try These Prompts
Retrieve the secret named 'DatabaseConnectionString' from Azure Key Vault and log its value.
Create a new secret called 'ApiKey' with the value 'xyz123', set it to enabled, add a contentType of 'text/plain', and tag it with environment=production.
Use the CryptographyClient to encrypt a message with RSA-OAEP algorithm, then decrypt it and verify the original content is preserved.
Create an RSA key with 2048-bit size, configure a rotation policy to auto-rotate every 90 days with a 30-day pre-expiry action, and set up monitoring for rotation events.
Best Practices
- Use DefaultAzureCredential for seamless authentication across development and production environments
- Enable soft-delete on production vaults to allow secret recovery within the retention period
- Set expiration dates on secrets and configure automatic rotation policies for cryptographic keys
Avoid
- Never hardcode secret values in source code or commit them to version control
- Avoid using master keys or root credentials - implement least-privilege access with specific key operations
- Do not disable soft-delete in production environments as it prevents recovery from accidental deletion
Frequently Asked Questions
What Azure permissions are required to use this skill?
Can I use this skill in browser-based applications?
How do I authenticate locally versus in Azure?
What happens when a secret expires?
Can I restore a deleted secret to a different vault?
How are soft-delete and purge protection different?
Developer Details
Author
sickn33License
MIT
Repository
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/azure-keyvault-secrets-tsRef
main
File structure
📄 SKILL.md