envpkt env export
Output export KEY='VALUE' statements that can be eval’d to inject secrets into the current shell session. Secrets are resolved via sealed packets and/or fnox — the same pipeline as envpkt exec, but without spawning a subprocess.
envpkt env export [options]Options
Section titled “Options”| Option | Description | Default |
|---|---|---|
-c, --config <path> | Path to envpkt.toml | Auto-detected |
--profile <profile> | fnox profile to use | Default |
--skip-audit | Skip the pre-flight audit | false |
Examples
Section titled “Examples”# Source secrets into the current shelleval "$(envpkt env export)"
# Use a specific fnox profileeval "$(envpkt env export --profile staging)"
# Specify config patheval "$(envpkt env export -c path/to/envpkt.toml)"Shell Startup
Section titled “Shell Startup”Add to ~/.zshrc or ~/.bashrc for automatic secret loading:
eval "$(envpkt env export 2>/dev/null)"Warnings are emitted to stderr so they don’t pollute the eval output.
How It Works
Section titled “How It Works”- Resolves
envpkt.toml(auto-detected or via--config) - Decrypts sealed packets and/or resolves via fnox
- Outputs
export KEY='VALUE'for each resolved secret to stdout - Emits any warnings to stderr
Values containing single quotes are safely escaped (' becomes '\'').