diff --git a/docs/cli/commands/init.mdx b/docs/cli/commands/init.mdx
index d477541b80..ef33e1d04a 100644
--- a/docs/cli/commands/init.mdx
+++ b/docs/cli/commands/init.mdx
@@ -9,6 +9,8 @@ infisical init
## Description
-Link a local project to the platform
+Link a local project to your Infisical project. Once connected, you can then access the secrets locally from the connected Infisical project.
-The command creates a `infisical.json` file containing your Project ID.
+
+This command creates a `infisical.json` file containing your Project ID.
+
diff --git a/docs/cli/commands/run.mdx b/docs/cli/commands/run.mdx
index a3f02cf444..fcc9be5493 100644
--- a/docs/cli/commands/run.mdx
+++ b/docs/cli/commands/run.mdx
@@ -25,13 +25,58 @@ description: "The command that injects your secrets into local environment"
## Description
-Inject environment variables from the platform into an application process.
+Inject secrets from Infisical into your application process.
-## Options
-| Option | Description | Default value |
-| -------------- | ----------------------------------------------------------------------------------------------------------- | ------------- |
-| `--env` | Used to set the environment that secrets are pulled from. Accepted values: `dev`, `staging`, `test`, `prod` | `dev` |
-| `--expand` | Parse shell parameter expansions in your secrets (e.g., `${DOMAIN}`) | `true` |
-| `--command` | Pass secrets into chained commands (e.g., `"first-command && second-command; more-commands..."`) | None |
-| `--secret-overriding`| Prioritizes personal secrets with the same name over shared secrets | `true` |
+## Subcommands & flags
+
+
+ Use this command to inject secrets into your applications process
+
+ ```bash
+ $ infisical run --
+
+ # Example
+ $ infisical run -- npm run dev
+ ```
+
+ ### flags
+
+ Pass secrets into multiple commands at once
+
+ ```bash
+ # Example
+ infisical run --command="npm run build && npm run dev; more-commands..."
+ ```
+
+
+
+ If you are using a [service token](../../getting-started/dashboard/token) to authenticate, you can pass the token as a flag
+
+ ```bash
+ # Example
+ infisical run --token="st.63e03c4a97cb4a747186c71e.ed5b46a34c078a8f94e8228f4ab0ff97.4f7f38034811995997d72badf44b42ec" -- npm run start
+ ```
+
+ You may also expose the token to the CLI by setting the environment variable `INFISICAL_TOKEN` before executing the run command. This will have the same effect as setting the token with `--token` flag
+
+
+
+ Turn on or off the shell parameter expansion in your secrets. If you have used shell parameters in your secret(s), activating this feature will populate them before injecting them into your application process.
+
+ Default value: `true`
+
+
+
+ This is used to specify the environment from which secrets should be retrieved. The accepted values are the environment slugs defined for your project, such as `dev`, `staging`, `test`, and `prod`.
+
+ Default value: `dev`
+
+
+
+ Prioritizes personal secrets with the same name over shared secrets
+
+ Default value: `true`
+
+
+
diff --git a/docs/cli/commands/secrets.mdx b/docs/cli/commands/secrets.mdx
index 0556e1866a..0e4190291c 100644
--- a/docs/cli/commands/secrets.mdx
+++ b/docs/cli/commands/secrets.mdx
@@ -14,17 +14,8 @@ This command enables you to perform CRUD (create, read, update, delete) operatio
Use this command to print out all of the secrets in your project
- ```
- $ infisical secrets
-
- ## Example
+ ```bash
$ infisical secrets
- ┌─────────────┬──────────────┬─────────────┐
- │ SECRET NAME │ SECRET VALUE │ SECRET TYPE │
- ├─────────────┼──────────────┼─────────────┤
- │ DOMAIN │ example.com │ shared │
- │ HASH │ jebhfbwe │ shared │
- └─────────────┴──────────────┴─────────────┘
```
### flags
@@ -45,16 +36,11 @@ This command enables you to perform CRUD (create, read, update, delete) operatio
This command allows you selectively print the requested secrets by name
- ```
+ ```bash
$ infisical secrets get ...
# Example
$ infisical secrets get DOMAIN
- ┌─────────────┬──────────────┬─────────────┐
- │ SECRET NAME │ SECRET VALUE │ SECRET TYPE │
- ├─────────────┼──────────────┼─────────────┤
- │ DOMAIN │ example.com │ shared │
- └─────────────┴──────────────┴─────────────┘
```
@@ -70,18 +56,11 @@ This command enables you to perform CRUD (create, read, update, delete) operatio
This command allows you to set or update secrets in your environment. If the secret key provided already exists, its value will be updated with the new value.
If the secret key does not exist, a new secret will be created using both the key and value provided.
-```
+```bash
$ infisical secrets set ...
## Example
$ infisical secrets set STRIPE_API_KEY=sjdgwkeudyjwe DOMAIN=example.com HASH=jebhfbwe
-┌────────────────┬───────────────┬────────────────────────┐
-│ SECRET NAME │ SECRET VALUE │ STATUS │
-├────────────────┼───────────────┼────────────────────────┤
-│ STRIPE_API_KEY │ sjdgwkeudyjwe │ SECRET VALUE UNCHANGED │
-│ DOMAIN │ example.com │ SECRET VALUE MODIFIED │
-│ HASH │ jebhfbwe │ SECRET CREATED │
-└────────────────┴───────────────┴────────────────────────┘
```
### Flags
@@ -95,12 +74,11 @@ $ infisical secrets set STRIPE_API_KEY=sjdgwkeudyjwe DOMAIN=example.com HASH=jeb
This command allows you to delete secrets by their name(s).
- ```
+ ```bash
$ infisical secrets delete ...
## Example
$ infisical secrets delete STRIPE_API_KEY DOMAIN HASH
- secret name(s) [STRIPE_API_KEY, DOMAIN, HASH] have been deleted from your project
```
### Flags