Skip to content

envpkt audit

Audit all secrets in envpkt.toml against lifecycle policies. Reports expiration status, staleness, missing metadata, and orphaned keys. Automatically resolves catalog references before auditing.

Terminal window
envpkt audit [options]
OptionDescriptionDefault
-c, --config <path>Path to envpkt.tomlAuto-detected
--format <format>Output format: table, json, minimaltable
--expiring <days>Show secrets expiring within N days
--status <status>Filter by status: healthy, expiring_soon, expired, stale, missing
--strictExit non-zero on any non-healthy secretfalse
Terminal window
# Standard audit
envpkt audit
# JSON output for CI
envpkt audit --format json
# Secrets expiring within 2 weeks
envpkt audit --expiring 14
# Only show expired secrets
envpkt audit --status expired
# Strict mode for CI pipelines
envpkt audit --strict
# Specify config path
envpkt audit -c path/to/envpkt.toml
CodeStatusDescription
0healthyAll secrets pass audit
1degradedSome secrets are expiring soon or stale
2criticalExpired or missing secrets detected

With --strict, any non-healthy secret causes a non-zero exit.

StatusMeaning
healthySecret is valid and within policy
expiring_soonSecret expires within stale_warning_days
expiredSecret has passed its expiration date
staleSecret is older than stale_warning_days without updates
missingSecret key exists in config but has no metadata
missing_metadataRequired fields (service, expiration) are absent