-
Notifications
You must be signed in to change notification settings - Fork 4k
Feature Request: Secure headless execution of environment variables without plaintext exposure #9621
Copy link
Copy link
Open
Labels
area:agentAgent workflows, conversations, prompts, cloud mode, and AI-specific UI.Agent workflows, conversations, prompts, cloud mode, and AI-specific UI.area:skillsAgent skills, skill authoring, and skill execution.Agent skills, skill authoring, and skill execution.area:warp-driveWarp Drive objects, sync, sharing, cloud object management, and persisted artifacts.Warp Drive objects, sync, sharing, cloud object management, and persisted artifacts.enhancementNew feature or request.New feature or request.ready-to-specThe issue is ready for a product and technical spec.The issue is ready for a product and technical spec.repro:mediumThe report suggests a plausible repro path, but some uncertainty remains.The report suggests a plausible repro path, but some uncertainty remains.triage-reviewedtriagedIssue has received an initial automated triage pass.Issue has received an initial automated triage pass.
Metadata
Metadata
Assignees
Labels
area:agentAgent workflows, conversations, prompts, cloud mode, and AI-specific UI.Agent workflows, conversations, prompts, cloud mode, and AI-specific UI.area:skillsAgent skills, skill authoring, and skill execution.Agent skills, skill authoring, and skill execution.area:warp-driveWarp Drive objects, sync, sharing, cloud object management, and persisted artifacts.Warp Drive objects, sync, sharing, cloud object management, and persisted artifacts.enhancementNew feature or request.New feature or request.ready-to-specThe issue is ready for a product and technical spec.The issue is ready for a product and technical spec.repro:mediumThe report suggests a plausible repro path, but some uncertainty remains.The report suggests a plausible repro path, but some uncertainty remains.triage-reviewedtriagedIssue has received an initial automated triage pass.Issue has received an initial automated triage pass.
Summary
A user is frustrated that while Warp stores static environment variables securely at rest, there is no built-in way to securely use them programmatically (e.g., in automated skills or cloud agents) without either writing them to disk (like a
.envfile) or exposing them in the shell session's environment where they can be leaked by background processes.Problem
The user wants to use an API key (e.g., for Monday.com) in an automated Warp skill without requiring a Touch ID prompt via 1Password. To achieve headless automation, the user must rely on a Service Account token or static variable, but doing so forces them to store or expose the token in plaintext (
.envor shell profile), bypassing Warp's security benefits. The user feels it is a failure that Warp securely stores variables but lacks a secure execution model to call them dynamically in scripts without exposure.Expected behavior
Warp should provide a way to inject secrets into scripts, workflows, or cloud agents dynamically at runtime without exposing them to the broader shell environment or requiring them to be written to disk in plaintext.
Actual behavior
To achieve automation without human interaction (no biometric prompt), users must currently expose secrets in plaintext files or global shell environment variables.
Reproduction steps or desired workflow
.envfile, shell profile, or globally exported variable to function automatically.Warp version
Unknown
Operating system
macOS