Skip to content

Known Issues

envsh is in early access. The core encryption, push/pull, team management, and CI/CD flows all work, but there are rough edges. This page tracks them honestly.

Re-push required after adding team members

Section titled “Re-push required after adding team members”

When a new member or machine is added, they can’t pull existing secrets until someone pushes again. This is by design — secrets are encrypted per-recipient, so a fresh push is needed to include the new key.

Workaround: After inviting someone or creating a machine, re-push the latest secrets:

Terminal window
envsh pull production --project my-api
envsh push .env --project my-api --env production

A future envsh rewrap command (#3) will allow granting access to new keys without re-pushing the full secret.

Flags must come before the environment argument:

Terminal window
# This works
envsh run --project myapp production -- node server.js
# This doesn't
envsh run production --project myapp -- node server.js

Status: Open.

envsh works on macOS and Linux. Windows is only supported through WSL (Windows Subsystem for Linux).

The REST API and CLI flags may change between 0.x releases. We’ll follow semver — breaking changes bump the minor version until 1.0.

Fixed in v0.2.0. Previously, being invited to another workspace required workarounds. Now use envsh workspace list to see all workspaces and envsh workspace switch WORKSPACE_ID to switch context.

Fixed in v0.2.0. Removing a member now instantly revokes their API access. The removed member can still run envsh workspace list and envsh workspace switch to return to their own workspace.

Fixed in v0.1.1. The envsh keys add command was not sending the key fingerprint to the server, causing key lookups to fail during decryption.

These are deliberate scope decisions for the initial release — not missing features. That said, we’re open to building them if there’s demand:

  • No web dashboard — CLI only for now. A lightweight read-only dashboard is something we’d consider.
  • No dynamic secrets — static key-value pairs only. Rotation and dynamic generation may come later.
  • No secret rotation — push a new version manually. Automated rotation is on the radar.
  • No granular permissions — admin or member, no per-environment ACLs. Fine-grained roles are a possibility for larger teams.
  • No SSO/SAML — email + code authentication only. SSO is likely the first of these to be built.
  • No integrations — no native Kubernetes, Terraform, or cloud provider plugins yet.

If any of these matter to you, let us know — real demand shapes the roadmap.

We track all planned work as GitHub issues. These are actively being worked on:

See all open issues — contributions are welcome.

Found a bug or have a feature request? Open an issue on GitHub.