Runners
Secrets
How Tenki Runners handle secrets and why we use GitHub Actions secrets directly.
Tenki does not operate a secrets store. All secrets used in your workflows live in GitHub Actions secrets (repo, environment, or organization) and are injected into the job at runtime through the standard secrets.* mechanism.
This page explains why.
The model
- You store secrets in GitHub Actions (or in your own secret manager pulled in at job-time).
- Tenki provisions a fresh VM for the job.
- GitHub passes the secret values into the runner environment as usual.
- The VM, including any cached secret material, is destroyed when the job ends.
Because the VM is single-use (see Security & Isolation), there is no persistent state where secret material could leak between jobs.
Why we don't run our own secrets store
Two reasons:
- Smaller blast radius. The fewer places your secrets live, the better. Re-using GitHub's secret store keeps the surface area to systems you already audit and trust.
- No vendor lock-in. Your workflows remain identical to vanilla GitHub Actions. Migrating to or from Tenki does not require re-keying anything.
See Security & Isolation for the full model.