Automic Vault

brew package intelligence

pulumi

Automic Vault tracks pulumi because plain text pulumi access tokens matters when AI agents run command-line tools on macOS.

overview

What Automic Vault knows about pulumi

Cloud native development platform

Homepage

Not present in the local metadata.

Commands and aliases

No executable aliases were found in the local package database.

radioisotope

Plain Text Pulumi Access Tokens

Pulumi stores cloud access tokens in credentials.json under the Pulumi home directory. Our isotope stores credentials.json in the macOS keychain and injects it through a temporary PULUMI_CREDENTIALS_PATH while `pulumi` runs.

Local README excerpt

Pulumi Radioisotope

Pulumi stores cloud access tokens in credentials.json under the Pulumi home directory. The radioisotope moves that credentials file into the macOS keychain and provides it to pulumi through a temporary PULUMI_CREDENTIALS_PATH while the command runs.

Caveats

  • Only credentials.json files with non-empty accessTokens are migrated.
  • Login/logout changes happen in the temporary runtime credentials directory

and are not persisted back to the keychain.

  • Direct execution of the original binary will not receive credentials.

Source: data/radioisotopes/pulumi/README.md

Caveats

  • Only credentials.json files with non-empty accessTokens are migrated.
  • Login/logout changes are not persisted back to the keychain.
  • Direct execution of the original binary will not receive credentials.

install metadata

Resolver facts

Package keybrew:pulumi
Last updated2026-05-19T13:36:49Z
Pulseupdated

source trail

Generated from repository data

This page is regenerated by scripts/generate-pkg-pages.py. Deployments refuse to publish if www/pkg/ is stale relative to local package data.

Used sources

  • Nucleus package database
  • local isotope README
  • radioisotope security manifest