Secrets And Env
Keep sensitive data encrypted and environment variables reproducible.
Track secrets safely
Add secret files so they are encrypted when gathered:
lct secrets add ~/.ssh/id_rsa
lct secrets add ~/.claude.json
During lct gather, secrets are encrypted into remote/secrets and flagged if untracked items are detected.
Manage environment variables
Store machine-specific environment values in the shared env file and reload them into your shell:
lct env set OPENAI_API_KEY sk-...
lct env list
lct env reload
Use lct env unset NAME to remove entries. Combine with lct reload in your shell profile to make values available on login.
Keep secrets separate from config
Keep API keys in lct secrets and lct env, while keeping public configuration in config.yaml. This allows you to push the remote repository without exposing sensitive data.