Maskit 🔒
A command-line tool for masking sensitive fields in configuration files.
Installation
Usage
Basic Usage
Mask sensitive fields in a configuration file using default keywords:
This creates config.maskit.json with sensitive fields replaced by *****.
Default keywords: key, secret, password, token, credential, auth, private, cert
Custom Keywords
Specify custom keywords to identify sensitive fields:
Custom Output Path
Save the masked file to a specific location:
Command Line Options
USAGE:
maskit [OPTIONS] <INPUT>
ARGS:
<INPUT> Input configuration file path
OPTIONS:
-h, --help Print help information
-k, --keywords <KEYWORDS> Keywords to search for in field names
[default: key,secret,password,token,credential,auth,private,cert]
-o, --output <OUTPUT> Output file path (default: adds .maskit before extension in current directory)
-s, --silent Silent mode - suppress all output
-V, --version Print version information
Examples
JSON Example
Input (config.json):
Output (config.maskit.json):
YAML Example
TOML Example
Silent Mode
Execute without any output (useful for scripts):
Supported Formats
- JSON (
.json) - YAML (
.yaml,.yml) - TOML (
.toml)
Security Notice
While Maskit helps prevent accidental exposure of sensitive data, always review masked files before sharing to ensure all sensitive information has been properly redacted.