dotenv vs config vs envalid vs dotenv-safe
Environment Configuration Management in Node.js Applications
dotenvconfigenvaliddotenv-safeSimilar Packages:
Environment Configuration Management in Node.js Applications

config, dotenv, dotenv-safe, and envalid are all npm packages designed to help manage application configuration, primarily by loading environment variables or external configuration files. They address the common need to separate configuration from code, support different environments (development, staging, production), and ensure that required settings are present and valid. While dotenv and its variants focus on loading .env files into process.env, config uses hierarchical JSON/YAML files, and envalid emphasizes runtime validation and type safety of environment variables.

Npm Package Weekly Downloads Trend
3 Years
Github Stars Ranking
Stat Detail
Package
Downloads
Stars
Size
Issues
Publish
License
dotenv93,878,05120,27393.3 kB72 days agoBSD-2-Clause
config1,544,9276,427105 kB172 days agoMIT
envalid439,5781,53984.4 kB93 months agoMIT
dotenv-safe191,52577110.4 kB42 years agoMIT

Managing Environment Configuration: config vs dotenv vs dotenv-safe vs envalid

When building Node.js applications, managing configuration across environments is a recurring challenge. The four packages — config, dotenv, dotenv-safe, and envalid — offer different philosophies for handling this problem. Let’s compare them based on how they load settings, validate inputs, and fit into real-world deployment scenarios.

📁 Source of Truth: Files vs Environment Variables

config uses hierarchical JSON/YAML files stored in a config directory.

  • Each environment (e.g., default.json, production.json) gets its own file.
  • Values are merged: defaultenvironment-specificlocal overrides.
// config/default.json
{ "port": 3000, "db": { "host": "localhost" } }

// config/production.json
{ "db": { "host": "prod-db.example.com" } }

// In code
const config = require('config');
console.log(config.get('port')); // 3000
console.log(config.get('db.host')); // 'prod-db.example.com' in production

dotenv, dotenv-safe, and envalid all rely on environment variables, typically loaded from a .env file during development.

  • The .env file is not used in production; variables are set directly in the environment.
  • All three inject values into process.env (though envalid discourages direct access afterward).
# .env
PORT=3000
DB_HOST=localhost
// dotenv / dotenv-safe
require('dotenv').config();
console.log(process.env.PORT); // '3000'

// envalid
const { cleanEnv, num, str } = require('envalid');
const env = cleanEnv(process.env, {
  PORT: num(),
  DB_HOST: str()
});
console.log(env.PORT); // 3000 (as a number)

💡 Key difference: config assumes filesystem access; the others assume environment variables are the primary source, which aligns better with 12-factor app principles and works in serverless/edge runtimes.

✅ Validation and Type Safety

dotenv provides no validation.

  • If a variable is missing or malformed, your app may crash later with a confusing error.
// dotenv – no safety net
require('dotenv').config();
const port = process.env.PORT; // Could be undefined or 'abc'
server.listen(port); // Might fail silently or throw later

dotenv-safe adds presence checking against a .env.example file.

  • It ensures every variable in .env.example exists in .env (or the actual environment).
  • But it doesn’t validate types or formats.
# .env.example
PORT=
DB_HOST=
// dotenv-safe
require('dotenv-safe').config(); // Throws if PORT or DB_HOST missing
const port = parseInt(process.env.PORT, 10); // Still need manual parsing

envalid offers declarative validation with type coercion.

  • You define expected variables with built-in validators (str(), num(), bool(), url(), etc.).
  • Missing or invalid values throw descriptive errors at startup.
  • Returns a clean object with correctly typed values.
const { cleanEnv, num, str } = require('envalid');
const env = cleanEnv(process.env, {
  PORT: num({ default: 3000 }),
  DB_HOST: str()
});
// env.PORT is guaranteed to be a number; env.DB_HOST a string

config has no built-in validation.

  • You can use config.has('key') to check existence, but type checking is manual.
  • Errors often surface only when the app tries to use a misconfigured value.
const config = require('config');
if (!config.has('db.host')) {
  throw new Error('Missing db.host');
}
// Still no guarantee it's a string or valid host

🛠️ Developer Experience and Debugging

dotenv is the simplest to start with — just npm install dotenv and call config().

  • Great for prototypes or internal tools where robustness isn’t critical.

dotenv-safe improves on this by failing fast if required variables are missing.

  • The .env.example file serves as living documentation of expected variables.

envalid provides the clearest error messages and encourages a single source of truth for config access.

  • Its cleanEnv output can be used throughout the app, reducing scattered process.env calls.
  • Works well with TypeScript via JSDoc or ambient types.

config offers powerful features like custom environment variables (CUSTOMER_ENV) and config watching, but its file-based approach can confuse developers expecting 12-factor compliance.

  • Debugging merge order (default → env → local) can be tricky without logging.

🌐 Deployment and Runtime Constraints

config requires filesystem access to read config files.

  • This breaks in serverless environments (AWS Lambda, Vercel Edge Functions) or Docker containers where the config directory might not be bundled.
  • Not suitable for frontend or edge runtimes.

dotenv, dotenv-safe, and envalid work anywhere process.env is available.

  • They’re compatible with serverless, Docker, and PaaS deployments (Heroku, Render, etc.).
  • In production, you skip .env files entirely and set variables via platform UI or CLI.
// All three work the same in production:
// No .env file needed — variables come from the environment

🔒 Security Considerations

config risks accidental exposure if config files are committed to version control.

  • Sensitive data (passwords, keys) should never be in config files unless encrypted.

dotenv and dotenv-safe encourage keeping .env out of Git (via .gitignore), but developers sometimes commit them by mistake.

  • Both load all variables into process.env, which could leak secrets if process.env is logged.

envalid mitigates this by returning a sanitized object that only includes declared variables.

  • You can avoid referencing process.env directly after initialization, reducing accidental leakage.
// envalid – only PORT and DB_HOST are exposed
const env = cleanEnv(process.env, { PORT: num(), DB_HOST: str() });
// process.env may contain AWS_SECRET_KEY, but env does not

📊 Summary Table

Featureconfigdotenvdotenv-safeenvalid
SourceJSON/YAML files.env file.env fileEnvironment variables
ValidationNoneNonePresence onlyFull type validation
Type CoercionNoNoNoYes
Fail-FastNoNoYes (missing vars)Yes (missing/invalid)
12-Factor Compliant
Serverless Friendly
Secrets SafetyRisky (files)MediumMediumHigh (sanitized)

💡 When to Use Which

  • Building a traditional Express app with full filesystem access?config gives you structure and inheritance.
  • Starting a quick prototype or internal tool?dotenv gets you up and running in seconds.
  • Working on a team and want to avoid missing env vars?dotenv-safe enforces a contract via .env.example.
  • Shipping a production app where config correctness is critical?envalid’s validation and type safety are worth the slight setup overhead.

In modern cloud-native development, envalid often strikes the best balance between safety, clarity, and compatibility — especially as teams adopt TypeScript and strict CI/CD practices. But for simpler cases, dotenv-safe offers a lightweight middle ground between raw dotenv and full validation.

How to Choose: dotenv vs config vs envalid vs dotenv-safe
  • dotenv:

    Choose dotenv when you need a simple, zero-configuration way to load key-value pairs from a .env file into process.env. It’s ideal for small to medium projects where you control the deployment environment and can ensure .env files are present during development. Since it performs no validation, it’s best paired with manual checks or used in contexts where missing or malformed variables are acceptable during early development.

  • config:

    Choose config if your application requires complex, hierarchical configuration that varies across multiple environments (e.g., development, test, production) and you prefer structured JSON or YAML files over environment variables. It’s well-suited for traditional server-side Node.js applications where filesystem access is available and you want fine-grained control over config inheritance and overrides. However, avoid it in serverless or edge environments where file system access is restricted or unavailable.

  • envalid:

    Choose envalid when you need strong guarantees about the presence, type, and correctness of environment variables at runtime. It provides declarative validation with built-in parsers (e.g., str(), num(), bool()), throws clear errors for invalid or missing values, and returns a sanitized, typed object that replaces direct process.env access. It’s especially valuable in production systems, CI/CD pipelines, or TypeScript projects where type safety and fail-fast behavior are priorities.

  • dotenv-safe:

    Choose dotenv-safe if you want the simplicity of dotenv but require a safety net to ensure critical environment variables are defined. It enforces the presence of all variables listed in a .env.example file, throwing an error at startup if any are missing. This is useful for team environments where you want to prevent accidental omissions of required settings without adding complex validation logic.

README for dotenv

dotenv NPM version downloads

dotenv

Dotenv is a zero-dependency module that loads environment variables from a .env file into process.env. Storing configuration in the environment separate from code is based on The Twelve-Factor App methodology.

Watch the tutorial

 

Usage

Install it.

npm install dotenv --save

Create a .env file in the root of your project:

# .env
S3_BUCKET="YOURS3BUCKET"
SECRET_KEY="YOURSECRETKEYGOESHERE"

And as early as possible in your application, import and configure dotenv:

require('dotenv').config() // or import 'dotenv/config' if you're using ES6
...
console.log(process.env) // remove this after you've confirmed it is working

That's it. process.env now has the keys and values you defined in your .env file:

 

Advanced

ES6

Import with ES6:

import 'dotenv/config'

ES6 import if you need to set config options:

import dotenv from 'dotenv'
dotenv.config({ path: '/custom/path/to/.env' })
bun
bun add dotenv
yarn
yarn add dotenv
pnpm
pnpm add dotenv
Monorepos

For monorepos with a structure like apps/backend/app.js, put it the .env file in the root of the folder where your app.js process runs.

# app/backend/.env
S3_BUCKET="YOURS3BUCKET"
SECRET_KEY="YOURSECRETKEYGOESHERE"
Multiline Values

If you need multiline variables, for example private keys, those are now supported (>= v15.0.0) with line breaks:

PRIVATE_KEY="-----BEGIN RSA PRIVATE KEY-----
...
Kh9NV...
...
-----END RSA PRIVATE KEY-----"

Alternatively, you can double quote strings and use the \n character:

PRIVATE_KEY="-----BEGIN RSA PRIVATE KEY-----\nKh9NV...\n-----END RSA PRIVATE KEY-----\n"
Comments

Comments may be added to your file on their own line or inline:

# This is a comment
SECRET_KEY=YOURSECRETKEYGOESHERE # comment
SECRET_HASH="something-with-a-#-hash"

Comments begin where a # exists, so if your value contains a # please wrap it in quotes. This is a breaking change from >= v15.0.0 and on.

Parsing

The engine which parses the contents of your file containing environment variables is available to use. It accepts a String or Buffer and will return an Object with the parsed keys and values.

const dotenv = require('dotenv')
const buf = Buffer.from('BASIC=basic')
const config = dotenv.parse(buf) // will return an object
console.log(typeof config, config) // object { BASIC : 'basic' }
Preload

Note: Consider using dotenvx instead of preloading. I am now doing (and recommending) so.

It serves the same purpose (you do not need to require and load dotenv), adds better debugging, and works with ANY language, framework, or platform. – motdotla

You can use the --require (-r) command line option to preload dotenv. By doing this, you do not need to require and load dotenv in your application code.

$ node -r dotenv/config your_script.js

The configuration options below are supported as command line arguments in the format dotenv_config_<option>=value

$ node -r dotenv/config your_script.js dotenv_config_path=/custom/path/to/.env dotenv_config_debug=true

Additionally, you can use environment variables to set configuration options. Command line arguments will precede these.

$ DOTENV_CONFIG_<OPTION>=value node -r dotenv/config your_script.js
$ DOTENV_CONFIG_ENCODING=latin1 DOTENV_CONFIG_DEBUG=true node -r dotenv/config your_script.js dotenv_config_path=/custom/path/to/.env
Variable Expansion

Use dotenvx for variable expansion.

Reference and expand variables already on your machine for use in your .env file.

# .env
USERNAME="username"
DATABASE_URL="postgres://${USERNAME}@localhost/my_database"
// index.js
console.log('DATABASE_URL', process.env.DATABASE_URL)
$ dotenvx run --debug -- node index.js
[dotenvx@0.14.1] injecting env (2) from .env
DATABASE_URL postgres://username@localhost/my_database
Command Substitution

Use dotenvx for command substitution.

Add the output of a command to one of your variables in your .env file.

# .env
DATABASE_URL="postgres://$(whoami)@localhost/my_database"
// index.js
console.log('DATABASE_URL', process.env.DATABASE_URL)
$ dotenvx run --debug -- node index.js
[dotenvx@0.14.1] injecting env (1) from .env
DATABASE_URL postgres://yourusername@localhost/my_database
Encryption

Use dotenvx for encryption.

Add encryption to your .env files with a single command.

$ dotenvx set HELLO Production -f .env.production
$ echo "console.log('Hello ' + process.env.HELLO)" > index.js

$ DOTENV_PRIVATE_KEY_PRODUCTION="<.env.production private key>" dotenvx run -- node index.js
[dotenvx] injecting env (2) from .env.production
Hello Production

learn more

Multiple Environments

Use dotenvx to manage multiple environments.

Run any environment locally. Create a .env.ENVIRONMENT file and use -f to load it. It's straightforward, yet flexible.

$ echo "HELLO=production" > .env.production
$ echo "console.log('Hello ' + process.env.HELLO)" > index.js

$ dotenvx run -f=.env.production -- node index.js
Hello production
> ^^

or with multiple .env files

$ echo "HELLO=local" > .env.local
$ echo "HELLO=World" > .env
$ echo "console.log('Hello ' + process.env.HELLO)" > index.js

$ dotenvx run -f=.env.local -f=.env -- node index.js
Hello local

more environment examples

Production

Use dotenvx for production deploys.

Create a .env.production file.

$ echo "HELLO=production" > .env.production

Encrypt it.

$ dotenvx encrypt -f .env.production

Set DOTENV_PRIVATE_KEY_PRODUCTION (found in .env.keys) on your server.

$ heroku config:set DOTENV_PRIVATE_KEY_PRODUCTION=value

Commit your .env.production file to code and deploy.

$ git add .env.production
$ git commit -m "encrypted .env.production"
$ git push heroku main

Dotenvx will decrypt and inject the secrets at runtime using dotenvx run -- node index.js.

Syncing

Use dotenvx to sync your .env files.

Encrypt them with dotenvx encrypt -f .env and safely include them in source control. Your secrets are securely synced with your git.

This still subscribes to the twelve-factor app rules by generating a decryption key separate from code.

More Examples

See examples of using dotenv with various frameworks, languages, and configurations.

 

Agents

dotenvx-as2

Software is changing, and dotenv must change with it—that is why I built agentic secret storage (AS2). Agents run code without humans at terminals, so plaintext .env files are the wrong primitive.

AS2 is built for autonomous software: encrypted by default, zero console access, and cryptography‑first delivery that keeps operators out of the loop.

It is backed by Vestauth, the trusted, pioneering auth layer for agents—giving each agent a cryptographic identity so requests are signed with private keys and verified with public keys. No shared secrets to leak.

It's what I'm using now. - motdotla

Quickstart

Install vestauth and initialize your agent.

npm i -g vestauth

vestauth agent init

Your agent sets secrets with a simple curl endpoint:

vestauth agent curl -X POST https://as2.dotenvx.com/set -d '{"KEY":"value"}'

And your agent gets secrets with a simple curl endpoint:

vestauth agent curl https://as2.dotenvx.com/get?key=KEY

That's it! This new primitive unlocks secrets access for agents without human-in-the-loop, oauth flows, or API keys. It's the future for agents.

 

FAQ

Should I commit my `.env` file?

No.

Unless you encrypt it with dotenvx. Then we recommend you do.

What about variable expansion?

Use dotenvx.

Should I have multiple `.env` files?

We recommend creating one .env file per environment. Use .env for local/development, .env.production for production and so on. This still follows the twelve factor principles as each is attributed individually to its own environment. Avoid custom set ups that work in inheritance somehow (.env.production inherits values form .env for example). It is better to duplicate values if necessary across each .env.environment file.

In a twelve-factor app, env vars are granular controls, each fully orthogonal to other env vars. They are never grouped together as “environments”, but instead are independently managed for each deploy. This is a model that scales up smoothly as the app naturally expands into more deploys over its lifetime.

The Twelve-Factor App

Additionally, we recommend using dotenvx to encrypt and manage these.

How do I use dotenv with `import`?

Simply..

// index.mjs (ESM)
import 'dotenv/config' // see https://github.com/motdotla/dotenv#how-do-i-use-dotenv-with-import
import express from 'express'

A little background..

When you run a module containing an import declaration, the modules it imports are loaded first, then each module body is executed in a depth-first traversal of the dependency graph, avoiding cycles by skipping anything already executed.

ES6 In Depth: Modules

What does this mean in plain language? It means you would think the following would work but it won't.

errorReporter.mjs:

class Client {
  constructor (apiKey) {
    console.log('apiKey', apiKey)

    this.apiKey = apiKey
  }
}

export default new Client(process.env.API_KEY)

index.mjs:

// Note: this is INCORRECT and will not work
import * as dotenv from 'dotenv'
dotenv.config()

import errorReporter from './errorReporter.mjs' // process.env.API_KEY will be blank!

process.env.API_KEY will be blank.

Instead, index.mjs should be written as..

import 'dotenv/config'

import errorReporter from './errorReporter.mjs'

Does that make sense? It's a bit unintuitive, but it is how importing of ES6 modules work. Here is a working example of this pitfall.

There are two alternatives to this approach:

  1. Preload with dotenvx: dotenvx run -- node index.js (Note: you do not need to import dotenv with this approach)
  2. Create a separate file that will execute config first as outlined in this comment on #133
Can I customize/write plugins for dotenv?

Yes! dotenv.config() returns an object representing the parsed .env file. This gives you everything you need to continue setting values on process.env. For example:

const dotenv = require('dotenv')
const variableExpansion = require('dotenv-expand')
const myEnv = dotenv.config()
variableExpansion(myEnv)
What rules does the parsing engine follow?

The parsing engine currently supports the following rules:

  • BASIC=basic becomes {BASIC: 'basic'}
  • empty lines are skipped
  • lines beginning with # are treated as comments
  • # marks the beginning of a comment (unless when the value is wrapped in quotes)
  • empty values become empty strings (EMPTY= becomes {EMPTY: ''})
  • inner quotes are maintained (think JSON) (JSON={"foo": "bar"} becomes {JSON:"{\"foo\": \"bar\"}")
  • whitespace is removed from both ends of unquoted values (see more on trim) (FOO= some value becomes {FOO: 'some value'})
  • single and double quoted values are escaped (SINGLE_QUOTE='quoted' becomes {SINGLE_QUOTE: "quoted"})
  • single and double quoted values maintain whitespace from both ends (FOO=" some value " becomes {FOO: ' some value '})
  • double quoted values expand new lines (MULTILINE="new\nline" becomes
{MULTILINE: 'new
line'}
  • backticks are supported (BACKTICK_KEY=`This has 'single' and "double" quotes inside of it.`)
What about syncing and securing .env files?

Use dotenvx to unlock syncing encrypted .env files over git.

What if I accidentally commit my `.env` file to code?

Remove it, remove git history and then install the git pre-commit hook to prevent this from ever happening again.

npm i -g @dotenvx/dotenvx
dotenvx precommit --install
What happens to environment variables that were already set?

By default, we will never modify any environment variables that have already been set. In particular, if there is a variable in your .env file which collides with one that already exists in your environment, then that variable will be skipped.

If instead, you want to override process.env use the override option.

require('dotenv').config({ override: true })
How can I prevent committing my `.env` file to a Docker build?

Use the docker prebuild hook.

# Dockerfile
...
RUN curl -fsS https://dotenvx.sh/ | sh
...
RUN dotenvx prebuild
CMD ["dotenvx", "run", "--", "node", "index.js"]
How come my environment variables are not showing up for React?

Your React code is run in Webpack, where the fs module or even the process global itself are not accessible out-of-the-box. process.env can only be injected through Webpack configuration.

If you are using react-scripts, which is distributed through create-react-app, it has dotenv built in but with a quirk. Preface your environment variables with REACT_APP_. See this stack overflow for more details.

If you are using other frameworks (e.g. Next.js, Gatsby...), you need to consult their documentation for how to inject environment variables into the client.

Why is the `.env` file not loading my environment variables successfully?

Most likely your .env file is not in the correct place. See this stack overflow.

Turn on debug mode and try again..

require('dotenv').config({ debug: true })

You will receive a helpful error outputted to your console.

Why am I getting the error `Module not found: Error: Can't resolve 'crypto|os|path'`?

You are using dotenv on the front-end and have not included a polyfill. Webpack < 5 used to include these for you. Do the following:

npm install node-polyfill-webpack-plugin

Configure your webpack.config.js to something like the following.

require('dotenv').config()

const path = require('path');
const webpack = require('webpack')

const NodePolyfillPlugin = require('node-polyfill-webpack-plugin')

module.exports = {
  mode: 'development',
  entry: './src/index.ts',
  output: {
    filename: 'bundle.js',
    path: path.resolve(__dirname, 'dist'),
  },
  plugins: [
    new NodePolyfillPlugin(),
    new webpack.DefinePlugin({
      'process.env': {
        HELLO: JSON.stringify(process.env.HELLO)
      }
    }),
  ]
};

Alternatively, just use dotenv-webpack which does this and more behind the scenes for you.

 

Docs

Dotenv exposes four functions:

  • config
  • parse
  • populate

Config

config will read your .env file, parse the contents, assign it to process.env, and return an Object with a parsed key containing the loaded content or an error key if it failed.

const result = dotenv.config()

if (result.error) {
  throw result.error
}

console.log(result.parsed)

You can additionally, pass options to config.

Options

path

Default: path.resolve(process.cwd(), '.env')

Specify a custom path if your file containing environment variables is located elsewhere.

require('dotenv').config({ path: '/custom/path/to/.env' })

By default, config will look for a file called .env in the current working directory.

Pass in multiple files as an array, and they will be parsed in order and combined with process.env (or option.processEnv, if set). The first value set for a variable will win, unless the options.override flag is set, in which case the last value set will win. If a value already exists in process.env and the options.override flag is NOT set, no changes will be made to that value.

require('dotenv').config({ path: ['.env.local', '.env'] })
quiet

Default: false

Suppress runtime logging message.

// index.js
require('dotenv').config({ quiet: false }) // change to true to suppress
console.log(`Hello ${process.env.HELLO}`)
# .env
HELLO=World
$ node index.js
[dotenv@17.0.0] injecting env (1) from .env
Hello World
encoding

Default: utf8

Specify the encoding of your file containing environment variables.

require('dotenv').config({ encoding: 'latin1' })
debug

Default: false

Turn on logging to help debug why certain keys or values are not being set as you expect.

require('dotenv').config({ debug: process.env.DEBUG })
override

Default: false

Override any environment variables that have already been set on your machine with values from your .env file(s). If multiple files have been provided in option.path the override will also be used as each file is combined with the next. Without override being set, the first value wins. With override set the last value wins.

require('dotenv').config({ override: true })
processEnv

Default: process.env

Specify an object to write your environment variables to. Defaults to process.env environment variables.

const myObject = {}
require('dotenv').config({ processEnv: myObject })

console.log(myObject) // values from .env
console.log(process.env) // this was not changed or written to

Parse

The engine which parses the contents of your file containing environment variables is available to use. It accepts a String or Buffer and will return an Object with the parsed keys and values.

const dotenv = require('dotenv')
const buf = Buffer.from('BASIC=basic')
const config = dotenv.parse(buf) // will return an object
console.log(typeof config, config) // object { BASIC : 'basic' }

Options

debug

Default: false

Turn on logging to help debug why certain keys or values are not being set as you expect.

const dotenv = require('dotenv')
const buf = Buffer.from('hello world')
const opt = { debug: true }
const config = dotenv.parse(buf, opt)
// expect a debug message because the buffer is not in KEY=VAL form

Populate

The engine which populates the contents of your .env file to process.env is available for use. It accepts a target, a source, and options. This is useful for power users who want to supply their own objects.

For example, customizing the source:

const dotenv = require('dotenv')
const parsed = { HELLO: 'world' }

dotenv.populate(process.env, parsed)

console.log(process.env.HELLO) // world

For example, customizing the source AND target:

const dotenv = require('dotenv')
const parsed = { HELLO: 'universe' }
const target = { HELLO: 'world' } // empty object

dotenv.populate(target, parsed, { override: true, debug: true })

console.log(target) // { HELLO: 'universe' }

options

Debug

Default: false

Turn on logging to help debug why certain keys or values are not being populated as you expect.

override

Default: false

Override any environment variables that have already been set.

 

CHANGELOG

See CHANGELOG.md

 

Who's using dotenv?

These npm modules depend on it.

Projects that expand it often use the keyword "dotenv" on npm.