Claude-skill-registry 1password-direnv-secrets

Configures 1Password CLI with direnv for fast, secure credential loading. Activates for: 1Password + direnv setup, slow secrets (>2 sec), .env.op files, op:// references, AWS credentials via env vars, --reveal flag issues, repeated biometric prompts, creating 1Password items programmatically, op item get errors. Not for: 1Password GUI usage, SSH keys (use 1Password SSH agent).

install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/1password-direnv-secrets" ~/.claude/skills/majiayu000-claude-skill-registry-1password-direnv-secrets && rm -rf "$T"
manifest: skills/data/1password-direnv-secrets/SKILL.md
safety · automated scan (low risk)
This is a pattern-based risk scan, not a security review. Our crawler flagged:
  • references .env files
  • references AWS credentials
Always read a skill's source content before installing. Patterns alone don't mean the skill is malicious — but they warrant attention.
source content

1Password CLI Secret Management

Secure credential management using 1Password CLI with zero plaintext secrets on disk.

Quick Reference

Use CaseApproachDetails
All secrets (AWS, DB, APIs)direnv +
op run
Core Pattern
CI/CD automationService account tokenSession Management
Creating items for users
op item create
Programmatic Creation

Key insight: Secrets load once on

cd
and all subprocesses inherit them (standard Unix
fork()
behavior). One
op
call, no re-fetching.


Core Pattern: direnv + op run

Use

op run --env-file
NOT multiple
op read
calls.

ApproachCLI InvocationsLoad Time
Multiple
op read
N per secret~5 seconds
Single
op run
1~1 second

Setup

1.

.env.op
(safe to commit - contains only
op://
references):

AWS_ACCESS_KEY_ID="op://Vault/Item/Access Key ID"
AWS_SECRET_ACCESS_KEY="op://Vault/Item/Secret Access Key"
DB_PASSWORD="op://Vault/Item/password"

2.

.envrc
(safe to commit - no secrets, just loader command):

direnv_load op run --env-file=.env.op --no-masking \
  --account=yourcompany.1password.com -- direnv dump

3. Enable:

direnv allow

Global Helper

Add to

~/.config/direnv/direnvrc
:

use_1password() {
  local env_file="${1:-.env.op}" account="${2:-yourcompany.1password.com}"
  [[ -f "$env_file" ]] && direnv_load op run --env-file="$env_file" \
    --no-masking --account="$account" -- direnv dump
}

Then

.envrc
becomes:
use 1password


Critical: The --reveal Flag

Concealed fields require

--reveal
to get actual values.

# WRONG - returns placeholder text, NOT the secret!
op item get "Item" --fields "Secret Access Key"
# Output: [use 'op item get xxx --reveal' to reveal]

# CORRECT - returns actual secret value
op item get "Item" --fields "Secret Access Key" --reveal

Common symptom:

SignatureDoesNotMatch
errors from AWS indicate the secret wasn't retrieved properly.


Reducing Biometric Prompts

ScenarioSolutionPrompts
Dev entering projectdirenv +
op run
1 on directory entry
CI/CD pipeline
OP_SERVICE_ACCOUNT_TOKEN
0

Key insight: Sessions last 10 minutes with auto-refresh on each use. Keep 1Password desktop app unlocked and integrated with CLI.

Detailed strategies: references/session-management.md


Discovery Commands

op account list                                    # Find accounts
op vault list --account mycompany.1password.com    # Find vaults
op item list --account mycompany.1password.com     # Find items

Full reference: references/discovery-commands.md - field inspection, search patterns, debugging


Creating Items Programmatically

For Claude Code workflows where Claude sets up infrastructure without handling raw secrets:

# Create item with placeholder values
op item create --category "API Credential" \
  --title "AWS Service-Name" \
  --vault "Private" \
  --account mycompany.1password.com \
  "Access Key ID[text]=REPLACE_ME" \
  "Secret Access Key[concealed]=REPLACE_ME"

User populates via 1Password app, then Claude continues with configuration.

Full pattern: references/programmatic-item-creation.md


What's Safe to Commit?

FileSafe?Why
.env.op
YesContains only
op://
pointers
.envrc
YesNo secrets - just loader command delegating to .env.op
.env
NeverContains actual secrets

The account name (e.g.,

yourcompany.1password.com
) isn't sensitive - it's just an identifier. For team projects, everyone uses the same account anyway.


Troubleshooting

ErrorFix
SignatureDoesNotMatch
(AWS)
Add
--reveal
for concealed fields
op: command not found
brew install --cask 1password-cli
could not find item
Names are case-sensitive; verify exact name

Full troubleshooting: references/session-management.md#troubleshooting-excessive-prompts


Prerequisites

# Install 1Password CLI (v2.18.0+ for service accounts)
brew install --cask 1password-cli

# Install direnv (for env var approach)
brew install direnv
echo 'eval "$(direnv hook zsh)"' >> ~/.zshrc

# Sign in and integrate with desktop app
op signin --account=yourcompany.1password.com

# Verify integration
op whoami

Required: 1Password desktop app with CLI integration enabled (Settings → Developer → CLI Integration).


Detailed References