SecretTUI is a Terminal User Interface (TUI) application built with Textual that allows you to view and manage secrets stored in your system's keyring. It provides a convenient way to browse your stored credentials directly from your terminal.
This is a vibe coding experiment using Goose and KiloCode with Gemini 2.5 Flash.
- List Secrets: Displays a list of all secrets accessible via the system's keyring.
- Search Functionality: Filter secrets by identifier (label, description, application, app_id) or username using a search input.
- View Secret Details: Select a secret from the list to view its full label, the secret content, and associated attributes in a modal popup.
- Keyboard Navigation: Navigate the TUI using keyboard shortcuts for efficient interaction.
To run SecretTUI, you need Python installed on your system. It also relies on keyring and secretstorage for interacting with the system's secret service, and textual for the TUI.
-
Clone the repository (if applicable):
git clone https://github.com/yz778/secret-tui.git cd secret-tui -
Install dependencies: It's recommended to use a virtual environment.
python -m venv venv source venv/bin/activate # On Windows, use `venv\Scripts\activate` pip install -r requirements.txt
To start the application, run the main.py script:
python main.pyqor^q(Ctrl+Q): Quit the application./: Search secrets.v: View details and toggle secret reveal.
SecretTUI uses the keyring library to interface with the operating system's secret service (e.g., GNOME Keyring, macOS Keychain, Windows Credential Manager). It retrieves a list of available secret items and allows the user to view their details, including the secret content itself and any associated attributes. The textual framework is used to render the interactive terminal interface.
This project is licensed under the MIT License - see the LICENSE file for details.