KosmoKrator

productivity

HashiCorp Vault CLI for Headless Automation

Use the HashiCorp Vault CLI for headless automation with headless JSON commands, schema discovery, credentials, and permission controls.

7 functions 5 read 2 write API token auth

HashiCorp Vault CLI for Headless Automation

Use KosmoKrator as a non-interactive integration runtime for local automations and wrappers.

Use headless automation when another tool needs a stable local command surface. The HashiCorp Vault CLI uses the same integration registry as the TUI, Lua runtime, and MCP gateway, but returns predictable command output for automation.

Command Shape

# HashiCorp Vault CLI for Headless Automation
kosmokrator integrations:configure vault --set token="$VAULT_TOKEN" --enable --read allow --write ask --json
kosmo integrations:call vault.vault_list_secrets '{"engine_path":"example_engine_path","path":"example_path"}' --json

Discovery Before Execution

Agents and scripts can inspect HashiCorp Vault docs and schemas before choosing a function.

kosmo integrations:docs vault --json
kosmo integrations:docs vault.vault_list_secrets --json
kosmo integrations:schema vault.vault_list_secrets --json
kosmo integrations:search "HashiCorp Vault" --json
kosmo integrations:list --json

Useful HashiCorp Vault CLI Functions

FunctionTypeParametersDescription
vault.vault_list_secrets Read engine_path, path List secrets at a given path in a HashiCorp Vault KV v2 secrets engine. Returns the keys (directory entries) at the specified path.
vault.vault_get_secret Read path, engine_path, version Get the latest version of a secret from a HashiCorp Vault KV v2 secrets engine. Optionally specify a version number to retrieve a specific version.
vault.vault_create_secret Write path, data, engine_path Create or update a secret in a HashiCorp Vault KV v2 secrets engine. Provide the secret path and a key-value data object.
vault.vault_delete_secret Write path, engine_path Permanently delete all versions and metadata of a secret from a HashiCorp Vault KV v2 secrets engine. This action is irreversible.
vault.vault_list_policies Read none List all ACL policies configured in HashiCorp Vault. Returns an array of policy names.
vault.vault_get_policy Read name Get details of a specific ACL policy in HashiCorp Vault, including its name and HCL rules.
vault.vault_get_current_user Read none Look up the current Vault token's information, including display name, policies, TTL, and metadata.

Automation Notes

Related HashiCorp Vault CLI Pages