Just encrypt your credentials with your secret key
Ranked in these QuestionsQuestion Ranking
Pro Complete control over secrets
No unencrypted data ever leaves your possession.
Pro Can share secrets among the trusted team
It's possible to encrypt with multiple public keys with very little overhead. So anybody who is in possession of one of the keys on the trusted list can decrypt the secrets.