Find Open-Source Alternatives
Discover powerful open-source replacements for popular commercial software. Save on costs, gain transparency, and join a community of developers.
Discover powerful open-source replacements for popular commercial software. Save on costs, gain transparency, and join a community of developers.
Compare community-driven replacements for HashiCorp Vault in secrets management workflows. We curate active, self-hostable options with transparent licensing so you can evaluate the right fit quickly.

These projects match the most common migration paths for teams replacing HashiCorp Vault.
Why teams pick it
Control your scheduling stack on your own infrastructure.
Run on infrastructure you control
Recent commits in the last 6 months
MIT, Apache, and similar licenses
Counts reflect projects currently indexed as alternatives to HashiCorp Vault.
Why teams pick it
Organizations requiring self-hosted deployment for compliance or data sovereignty

Secure, versioned secret management from development to production
Why teams choose it
Watch for
Enterprise‑only features require a commercial license
Migration highlight
CI/CD pipeline secret injection
Secrets are automatically synced to GitHub Actions, Vercel, and other pipelines, removing manual handling and reducing risk.

Universal CLI secret manager for seamless developer workflows

Role-based secrets management for modern cloud infrastructure

Open-source platform for secrets, PKI, and SSH management

Securely store, encrypt, and manage dynamic secrets at scale

Encrypted file editor supporting multiple formats and key providers
Teams replacing HashiCorp Vault in secrets management workflows typically weigh self-hosting needs, integration coverage, and licensing obligations.
Tip: shortlist one hosted and one self-hosted option so stakeholders can compare trade-offs before migrating away from HashiCorp Vault.
Why teams choose it
Watch for
Requires manual configuration of `.teller.yml`
Migration highlight
Run a local application with Vault secrets
The app starts with environment variables populated directly from HashiCorp Vault, avoiding any credential files on disk.
Why teams choose it
Watch for
Requires PostgreSQL database management and backup strategy
Migration highlight
CI/CD Pipeline Secret Injection
Securely deliver database credentials and API keys to build agents without hardcoding secrets in repositories or environment variables
Why teams choose it
Watch for
Enterprise features in the `ee` directory require a commercial license
Migration highlight
Multi-cloud secret synchronization
Centrally manage secrets and automatically sync to AWS, Vercel, GitHub Actions, and other platforms, eliminating manual updates and reducing configuration drift across environments.
Why teams choose it
Watch for
Development requires Go toolchain and familiarity with Make
Migration highlight
Dynamic AWS credentials for CI pipelines
Short‑lived keys are issued on demand and automatically revoked, minimizing exposure from compromised pipelines.
Why teams choose it
Watch for
Requires external key management infrastructure setup
Migration highlight
Kubernetes Secret Management
Encrypt Kubernetes manifests with sensitive data, commit to Git, and decrypt during deployment pipelines while maintaining full audit history.