Cursor
Cursor has accelerated workflows for many development teams. This, however, comes with some risks. Unless your team has gone to great lengths to hide secrets from Cursor, you’re probably sending secrets to their AI agents and potentially leaking them in the code it generates.
varlock exists to solve both of those problems. By never storing the secret values, you never have to worry about sending them to Cursor’s servers. But because of the new .env.schema format you will have better AX (agent experience) when dealing with environment variables.
Get started
Section titled “Get started”To get the most secure experience with Cursor, run:
varlock initnpx varlock inityarn dlx varlock initpnpm dlx varlock init.cursorignore
Section titled “.cursorignore”By default, cursor now ignores .env.* files. This is a good thing, but it means that you need to explicitly allow the files you want to use with Cursor.
To do this, create a .cursorignore file in the root of your project and add the following:
!.env.schemallms.txt
Section titled “llms.txt”To give Cursor the full context of what varlock is capable of, you can add custom docs to your project. To do this, follow the instructions to add custom docs and point it to:
https://varlock.dev/llms-full.txtCursor rules
Section titled “Cursor rules”Finally, you can add a Cursor rule to your project to ensure that varlock is used when updating environment variables. To do this, follow the instructions to add a project rule and copy our latest Cursor rules.