Audit all secrets in envpkt.toml against lifecycle policies. Reports expiration status, staleness, missing metadata, and orphaned keys. Automatically resolves catalog references before auditing.
Option Description Default -c, --config <path>Path to envpkt.toml Auto-detected --format <format>Output format: table, json, minimal table--expiring <days>Show secrets expiring within N days — --status <status>Filter by status: healthy, expiring_soon, expired, stale, missing — --strictExit non-zero on any non-healthy secret false
envpkt audit --format json
# Secrets expiring within 2 weeks
envpkt audit --expiring 14
# Only show expired secrets
envpkt audit --status expired
# Strict mode for CI pipelines
envpkt audit -c path/to/envpkt.toml
Code Status Description 0healthy All secrets pass audit 1degraded Some secrets are expiring soon or stale 2critical Expired or missing secrets detected
With --strict, any non-healthy secret causes a non-zero exit.
Status Meaning healthySecret is valid and within policy expiring_soonSecret expires within stale_warning_days expiredSecret has passed its expiration date staleSecret is older than stale_warning_days without updates missingSecret key exists in config but has no metadata missing_metadataRequired fields (service, expiration) are absent