<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: devenjarvis</title><link>https://news.ycombinator.com/user?id=devenjarvis</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 07:31:25 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=devenjarvis" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by devenjarvis in "Ask HN: What are you working on? (February 2026)"]]></title><description><![CDATA[
<p>Over the last few weeks I’ve been building Pointless (<a href="https://pointless.cards" rel="nofollow">https://pointless.cards</a>), a Planning Poker webapp that’s both frictionless (no sign up) and actually fun!<p>I’m trying to embody the experience of a JackBox game into a Scrum ceremony that should be lightweight but is often painful and tedious. I’ve also gotten to learn a lot about Cloudflare Durable Objects building this and have been delighted with how easy they (and PartyKit) make building multiplayer apps like this.<p>It’s completely free (I plan to keep it that way) and full of easter eggs and delightful jokes at the expense of Jira and modern software development, of course. If your team is following Scrum and could use a bit more joy in the process you should check it out!</p>
]]></description><pubDate>Mon, 09 Feb 2026 13:02:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46944783</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=46944783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46944783</guid></item><item><title><![CDATA[The Culture Is in the Code Review]]></title><description><![CDATA[
<p>Article URL: <a href="https://deven.codes/posts/the-culture-is-in-the-code-review/">https://deven.codes/posts/the-culture-is-in-the-code-review/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44288705">https://news.ycombinator.com/item?id=44288705</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 16 Jun 2025 11:52:03 +0000</pubDate><link>https://deven.codes/posts/the-culture-is-in-the-code-review/</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=44288705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44288705</guid></item><item><title><![CDATA[Show HN: RunSecret – An open source secrets management CLI for developers]]></title><description><![CDATA[
<p>Hey everyone!<p>I’m excited to share RunSecret (aka: rsec), an open source CLI I built to make working with secrets during local development easier and more secure.<p>If your experience is anything like mine, your team probably has secrets they need to use during local development (ex: API Keys, JWT Signing Secrets, DB credentials, etc) and you may have solved that problem with a git-ignored .env file, like many of my past teams have. If this sounds familiar then you may have also experienced my pain of securely bootstrapping secrets for every new team member, accidental commits when the .env file gets renamed to .env_tmp (yes, that actually happened), tripping over rotating secrets on every local machine, and explaining to your security team that everybody who offboards has all those secrets in plaintext on the laptop they just took with them. If you’ve felt any of this pain, then you know why I built RunSecret!<p>The core idea behind RunSecret is based on secret references: URL-like addresses that point to a secret in your team’s vault of choice. These references can be generated by RunSecret and used to replace instances of that secret currently stored in .env files or ENV VARS. When you run any command with RunSecret those references will be loaded and replaced with the real deal - but only during runtime, and only for that command! This means two, pretty-cool things:<p>1. .env files are safe to commit and share across your team again. This means access to secrets is controlled by your vault, and onboarding, rotation and offboarding access to these secrets is all automated now. (Big plus, your security team is also happier!)
2. If you are already using env vars to pass secrets into your application, you can use RunSecret without changing a single line of code.<p>RunSecret is built to be vault agnostic, and current supports AWS Secrets Manager, Azure Key Vault, and HashiCorp Vault (with more on the way). I’ve also built in some bells and whistles, like automatic redaction of any referenced secret in your application's stdout/stderr to reduce the chance of leaks. It’s still early days, and there’s a lot more I want to build out for RunSecret, but the core functionality is there and I’d love to start getting feedback from others and their use cases.<p>If you are interested you can check it out on GitHub here: <a href="https://github.com/runsecret/rsec">https://github.com/runsecret/rsec</a><p>I’d be remiss if I didn’t credit the original inspiration for RunSecret. If you’ve ever used 1Password’s very well done CLI, `op` , this all probably looks familiar to you. RunSecret was an itch I had to scratch after working on a team that used 1Password as its team vault, and then dealing with withdrawals when I switched to an org that used AWS Secrets Manager instead. For anyone who has or currently uses `op` , and misses that functionality with other secret vaults you work with, RunSecret might be interesting to you!<p>I hope you enjoy RunSecret, and would love any and all feedback you have to make this better. Thanks for checking out my project!</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44041053">https://news.ycombinator.com/item?id=44041053</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 20 May 2025 12:57:34 +0000</pubDate><link>https://github.com/runsecret/rsec</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=44041053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44041053</guid></item><item><title><![CDATA[New comment by devenjarvis in "Show HN: An MCP server for understanding AWS costs"]]></title><description><![CDATA[
<p>This is great feedback, thank you!<p>I agree RunSecret adds a level of indirection at this stage that op doesn’t (if you are using 1pass). This is something I plan to polish up once more vaults are supported. You’ve given me some ideas on how to do that here.<p>And thanks for the advice on doing a Show HN, planning to do so once a few more rough edges are smoothed out.</p>
]]></description><pubDate>Wed, 30 Apr 2025 15:54:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=43846978</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=43846978</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43846978</guid></item><item><title><![CDATA[New comment by devenjarvis in "Show HN: An MCP server for understanding AWS costs"]]></title><description><![CDATA[
<p>The 1pass CLI is great! However if you aren’t using 1password as your secrets vault, I’m building an open source, vault-agnostic alternative called RunSecret (<a href="https://github.com/runsecret/rsec">https://github.com/runsecret/rsec</a>)</p>
]]></description><pubDate>Wed, 30 Apr 2025 12:07:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=43844048</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=43844048</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43844048</guid></item><item><title><![CDATA[New comment by devenjarvis in "Ask HN: What are you working on? (April 2025)"]]></title><description><![CDATA[
<p>Yea that is a hard problem to solve. Right now RunSecret depends on the host system (your laptop, CI runner, or application container) having access to the secret vault(s) of choice that you reference. This can be through ENV VARS, OIDC, or IAM roles (in some cases) but currently there is no HSM support.</p>
]]></description><pubDate>Mon, 28 Apr 2025 23:16:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=43827131</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=43827131</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43827131</guid></item><item><title><![CDATA[New comment by devenjarvis in "Ask HN: What are you working on? (April 2025)"]]></title><description><![CDATA[
<p>Ahh, yup! The RunSecret CLI is completely free and open source.<p>Azure KeyVault support is in progress and should land soon. I will notate it in the release changelog once it’s ready, but I’m also happy to reply here or let you know another way if you are interested!</p>
]]></description><pubDate>Mon, 28 Apr 2025 22:55:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=43826999</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=43826999</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43826999</guid></item><item><title><![CDATA[New comment by devenjarvis in "Ask HN: What are you working on? (April 2025)"]]></title><description><![CDATA[
<p>Thanks for checking it out! The pain point for me has largely been during local development, especially in a team setting when secrets change or people onboard or roll off and those manually managed .env files get unwieldy.<p>Gitlab Secrets looks cool, but that hits at another reason I think RunSecret is valuable even for CI - we don’t use GitLab at my day job so it’s not an option for me! I think GitLab and 1password have interesting proprietary solutions that definitely have inspired RunSecret, but I’d love to see an open source, universal solution here - which I’m hoping RunSecret can be!</p>
]]></description><pubDate>Mon, 28 Apr 2025 22:07:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=43826644</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=43826644</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43826644</guid></item><item><title><![CDATA[New comment by devenjarvis in "Ask HN: What are you working on? (April 2025)"]]></title><description><![CDATA[
<p><a href="https://github.com/runsecret/rsec">https://github.com/runsecret/rsec</a><p>An easier and more secure way to work with secrets during local development. It’s open source, cloud/vault agnostic, and doesn’t require a single line of code change to use. I call it RunSecret.<p>RunSecret is a CLI that replaces your static secrets with “secret references” in your ENV VARs (or .env files). These references are then replaced when your application starts up by reaching out to your secret vault of choice - making your .env safe to share across your whole team and removing a slew of gotchas when you use git ignored env files. Even better RunSecret redacts any instance of these secrets from your application output, reducing your chances for accidental leaks.<p>The approach is inspired by the 1password CLI, but built for the rest of us. I’ve got AWS Secrets Manager support pretty well baked, but the goal is to support all major secret vaults within the next couple of months (Azure KeyVault is already in progress).</p>
]]></description><pubDate>Mon, 28 Apr 2025 21:41:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=43826445</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=43826445</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43826445</guid></item><item><title><![CDATA[New comment by devenjarvis in "Building for Builders"]]></title><description><![CDATA[
<p>Thanks! It’s a slightly modified version of this Hugo Tufte theme: <a href="https://github.com/loikein/hugo-tufte">https://github.com/loikein/hugo-tufte</a></p>
]]></description><pubDate>Thu, 14 Mar 2024 14:29:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=39704481</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=39704481</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39704481</guid></item><item><title><![CDATA[Building for Builders]]></title><description><![CDATA[
<p>Article URL: <a href="https://deven.codes/posts/building-for-builders/">https://deven.codes/posts/building-for-builders/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39678857">https://news.ycombinator.com/item?id=39678857</a></p>
<p>Points: 41</p>
<p># Comments: 2</p>
]]></description><pubDate>Tue, 12 Mar 2024 12:50:21 +0000</pubDate><link>https://deven.codes/posts/building-for-builders/</link><dc:creator>devenjarvis</dc:creator><comments>https://news.ycombinator.com/item?id=39678857</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39678857</guid></item></channel></rss>