Expand description
Direct exec-replace injection — Command::status() with secrets in env.
This is the simplest execution mode: the prepared child takes over the
current process slot (or runs as a sibling and is wait’d on) with the
decrypted secret(s) injected via environment variables. No supervision,
no leak detection — when raw speed and minimal overhead matter.
Also home of two security primitives that aren’t tied to a single execution mode but logically belong with the inject surface:
validate_env_var_name— rejects env-var names that would weaponize the loader (LD_PRELOAD,DYLD_INSERT_LIBRARIES, …) or violate the POSIXIEEE Std 1003.1name grammar.command_fingerprint— argv-binding fingerprint used to scope an approval to a specific invocation pattern (so an approval forwrangler deploydoesn’t auto-allowwrangler --shell evil.sh).
Structs§
- Inject
Exec Options - Execution options for process launch behavior.
- Inject
Request - A request to inject a single secret into a child process.
Functions§
- command_
fingerprint - Argv-binding fingerprint for command-pattern-scoped approval.
- execute
- Execute an inject request: decrypt the secret, enforce policy, and exec the child process with the secret as an env var.
- execute_
multi - Inject multiple secrets into a single child process.
- execute_
multi_ with_ options - Inject multiple secrets with explicit execution options.
- execute_
with_ options - Execute an inject request with explicit execution options.
- validate_
env_ var_ name - Validate an env-var name about to receive a decrypted secret.