Skip to content

vault

OfficialAgent-readyInfraSecurity

Secrets, identity, and pki from the terminal.

The official CLI from HashiCorp. Secrets, identity, and pki from the terminal. Supports structured output — good for scripts and agents.

Task fit

secrets, identity, and pki from the terminal.

Lane

Work with Kubernetes, Terraform, containers, and ops tooling with more confidence.

Operator brief

Use vault for secrets, identity, and pki from the terminal.

Run `vault server -dev` and see what comes back.

Repository family

HashiCorp

First trust check

vault responds locally and you can move on to authentication or project setup.

Safe first loop

Install, verify, then run one real command.

Infra inspection loop

Install command

$ brew tap hashicorp/tap && brew install hashicorp/tap/vault

Operator pack

Copy or export the working notes for this CLI before handing it to an agent.

Verify

$ vault --help

vault responds locally and you can move on to authentication or project setup.

First real command

$ vault server -dev

First steps

  1. 01Install vault.
  2. 02Run `vault --help` first.
  3. 03Start with `vault server -dev`.
  4. 04Authenticate vault before asking the agent to do real work.

When to use / hold off when

Best for

secrets, identity, and pki from the terminal.

Use this when

You're on HashiCorp and want the official terminal experience.

Hold off when

You're not comfortable with a tool that can write to production.

Trust and constraints

trusted99/100
OfficialInstall readyTrustedCaution
JSON outputYes
Non-interactiveYes
CI-friendlyYes

Why operators pick it

  • vault fits infra well, especially for secrets, identity, and pki from the terminal.
  • It is the official CLI from HashiCorp.
  • Good for scripts and agents.

Constraints

  • Sign in before real work.
  • Start with read-only or dry-run commands.

Facts and links

Install withbrew
Docker pulls218.7M
GitHub stars35.3K
LicenseNOASSERTION
UpdatedMar 25, 2026