From install to secure in four CLI commands
Install the CLI with a single command. Works on macOS, Linux, and Windows — Native AOT binary, no runtime needed.
Run depvault scan in your repo to analyze dependencies, detect vulnerabilities, find leaked secrets, and discover env files — all at once.
Push .env files and secret keys to the encrypted vault. Pick environments per file — development, staging, production — in one interactive flow.
Teammates pull secrets with depvault pull. CI/CD pipelines use scoped tokens. No .env files in Slack, no secrets in git.
Dependency analysis, encrypted vaults, secret sharing, and more — one unified platform
Run depvault scan in any repo to instantly detect outdated packages, known CVEs, and license conflicts. Supports package.json, requirements.txt, Cargo.toml, go.mod, *.csproj, and more — no file uploads needed.
End-to-end encrypt environment variables and secret files — SSL certificates, private keys, keystores, cloud credentials — with AES-256-GCM. Secrets are encrypted in your browser before they reach the server. Even we can't read them.
Generate one-time encrypted links where the decryption key lives only in the URL — the server never sees it. Set expiration times, add optional passwords, and stop credentials from sitting in Slack or email history. Every link creation, access, and expiration is tracked in the audit log.
Built-in tools for every stage of your security workflow
Native AOT binary — no runtime needed. Scan, push, and pull from your terminal. Browser-based login, interactive prompts, and CI/CD token mode.
Scan connected repos for accidentally committed secrets with built-in and custom regex patterns.
Generate scoped, short-lived tokens for pipelines to pull end-to-end encrypted secrets at build time — no .env files in CI.
Convert between .env, appsettings.json, YAML, TOML, and more with preview before download.
Clone an environment's variable structure to bootstrap new stages. Diff templates against live environments.
Detect license types per dependency, configure allow/warn/block policies, and export audit reports.
Download all required env variables and secret files for an environment as a single encrypted archive with a one-time password.
Analyze dependencies, manage secrets, and store sensitive files across every major ecosystem
Node.js
Python
Rust
.NET
Go
Java / Kotlin
Ruby
PHP
.env
appsettings.json
secrets.yaml
values.yaml
application.properties
application.yml
config.toml
config.yaml
SSL / TLS Certificates
Private Keys
Java / Android Keystores
iOS Provisioning Profiles
Cloud Credentials
SSH Keys
GPG / PGP Keys
Your secrets are encrypted before they leave your browser. The server stores only ciphertext — it can never decrypt your data.
Your vault password never leaves your device. Encryption keys are derived locally with PBKDF2-SHA256 — we never see them.
All secrets are encrypted with AES-256-GCM in your browser before they reach the server. Even we can't read your data.
The full codebase is open on GitHub. Audit the encryption implementation, verify our claims, and contribute.
If you forget your password, your recovery key restores access. There are no master keys and no server-side backdoors.
9+
Ecosystems supported
Zero-Knowledge
Server never sees your secrets
AES-256-GCM
End-to-end encryption
Open Source
Fully auditable codebase
Install the CLI, scan your repo, and push secrets to the vault — all in under 2 minutes. Free for individual developers, scalable for teams.