Homepage
Not present in the local metadata.
brew package intelligence
Automic Vault tracks gh because trivially accessible secrets matters when AI agents run command-line tools on macOS.
overview
GitHub command-line tool
Not present in the local metadata.
No executable aliases were found in the local package database.
radioisotope
`gh` stores its secrets in the Keychain but they can be trivially obtained: 1. `gh auth token` 2. `security find-generic-password -s 'gh:github.com' -w` Our isotope prevents anything but `gh` itself from accessing its secrets by gating `gh auth token` behind a Automic Vault human-approval prompt and gating attempts to use the macOS `security` tool behind a keychain approval prompt.
Local README excerpt
This repository is the Automic Vault fork of GitHub CLI.
Automic Vault is a macOS-first secret and execution control system that keeps sensitive credentials behind explicit human approval in the Automic Vault GUI app instead of exposing them directly to terminal tools.
This fork currently adds the following behavior on top of upstream cli/cli:
gh binary instead of/usr/bin/security, so Keychain trust is attached to this app binary.
print stored tokens in plain text. This covers gh auth token, gh auth status --show-token, gh config get -h HOST oauth_token, and the hidden gh auth git-credential get helper.
secrets from the factory-release to our isotope.
gh installs, including plaintexthosts.yml tokens and Keychain ACLs that allow /usr/bin/security to read gh secrets.
Source: data/isotopes/gh-cli/README.md
https://github.com/automic-vault/gh-cli/releases/tag/v2.92.0
approval gates
The local approval-gate seed includes 8 rules for gh. Covered entrypoints: gh. Severity labels: critical, high.
install metadata
| Package key | brew:gh |
|---|---|
| Last updated | 2026-05-21T14:58:05+02:00 |
| Pulse | updated |
source trail
This page is regenerated by scripts/generate-pkg-pages.py. Deployments refuse to publish if www/pkg/ is stale relative to local package data.