Automic Vault

brew package intelligence

hcloud

Automic Vault tracks hcloud because plain text hcloud api tokens matters when AI agents run command-line tools on macOS.

overview

What Automic Vault knows about hcloud

Command-line interface for Hetzner Cloud

Homepage

Not present in the local metadata.

Commands and aliases

No executable aliases were found in the local package database.

radioisotope

Plain Text hcloud API Tokens

hcloud stores authenticated contexts in ~/.config/hcloud/cli.toml. Each context contains a Hetzner Cloud API token. Our isotope stores that config file in the macOS keychain and exposes it through a temporary HCLOUD_CONFIG only while `hcloud` runs.

Local README excerpt

hcloud Radioisotope

The hcloud CLI stores Hetzner Cloud API tokens in its local TOML config file, usually ~/.config/hcloud/cli.toml. Automic Vault migrates that config into the macOS keychain and injects it through a temporary HCLOUD_CONFIG file only while hcloud runs.

This keeps package-owned local tokens out of plaintext home-directory config without changing hcloud's command-line interface.

Caveats

  • Runtime config changes are not persisted back to the keychain.
  • Explicit --config arguments can override the temporary injected config.
  • Direct execution of the original binary will not receive credentials.

Source: data/radioisotopes/hcloud/README.md

Caveats

  • Runtime config changes are not persisted back to the keychain.
  • Explicit --config arguments can override the temporary config.
  • Direct execution of the original binary will not receive credentials.

install metadata

Resolver facts

Package keybrew:hcloud
Last updated2026-05-21T13:58:03Z
Pulseupdated

source trail

Generated from repository data

This page is regenerated by scripts/generate-pkg-pages.py. Deployments refuse to publish if www/pkg/ is stale relative to local package data.

Used sources

  • Nucleus package database
  • local isotope README
  • radioisotope security manifest