hyperlocalise reads provider credentials from:
- Export variables in your current shell session.
.envand.env.localfiles in your current project directory.
- Already-exported shell variables are kept as-is.
- For variables not already exported,
.env.localoverrides.env.
LLM providers
OpenAI
Azure OpenAI
Gemini
Anthropic
AWS Bedrock
LM Studio
Ollama
Groq
Storage adapters
POEditor
Lilt
Lokalise
Crowdin
Smartling
storage.config.userIdentifier in i18n.jsonc.
Security guidance
- Prefer environment variables over hardcoded tokens.
- Keep
.envand.env.localout of version control. - Rotate tokens regularly and scope them to least privilege.
Credential management standard for local and CI
Use this operating model for all remote storage adapters, including Smartling, Lokalise, and internal custom adapters.Local development
- Commit only non-secret config (
*Envvariable names) toi18n.jsonc. - Store real tokens in
.env.local(developer machine only). - Add
.envand.env.localto.gitignore. - Use separate dev and production TMS credentials.
CI environments
- Store secrets in your CI secret manager (for example, GitHub Actions Secrets).
- Inject secrets only into the sync job that needs them.
- Map CI secrets to environment variables expected by your adapter config.
- Use environment-scoped secrets and branch protections for production sync.
Rotation and least privilege
- Rotate tokens on a fixed schedule (for example every 90 days) and on team member offboarding.
- Create dedicated CI service users per TMS workspace or project.
- Restrict each token to the minimum API scopes required for pull/push.
- Validate rotation by running one dry-run sync before deleting the previous credential.
Audit-friendly logging policy
- Never print raw secrets to logs, debug output, screenshots, or issue comments.
- Log only credential source names (
SMARTLING_USER_SECRET,LOKALISE_API_TOKEN), not values. - Keep CLI output in machine-readable formats (
--output jsonor--output csv) for audit trails. - Store CI logs and sync artifacts according to your retention policy.
TMS adapter security checklist
Use this checklist before enabling write-enabled CI jobs.- All adapter secrets are provided through environment variables, not inline config.
- CI uses dedicated service credentials (no personal access tokens).
- Credential scopes are limited to required projects and operations.
- Rotation schedule is documented and owned by a team.
- Pipeline logs do not expose token values.
- Scheduled dry-run
sync pullandsync pushjobs run successfully. - Manual approval is required before production write sync, if needed.