Displaying 1 to 20 from 31 results

transcrypt - transparently encrypt files within a git repository

A script to configure transparent encryption of sensitive files stored in a Git repository. Files that you choose will be automatically encrypted when you commit them, and automatically decrypted when you check them out. The process will degrade gracefully, so even people without your encryption password can safely commit changes to the repository's non-encrypted files. transcrypt protects your data when it's pushed to remotes that you may not directly control (e.g., GitHub, Dropbox clones, etc.), while still allowing you to work normally on your local working copy. You can conveniently store things like passwords and private keys within your repository and not have to share them with your entire team or complicate your workflow.

EnvKey - Protect API keys and credentials, Keep configuration in sync everywhere.

This is EnvKey's cross-platform native application. It supports Mac, Windows, and Linux. EnvKey is an end-to-end encrypted secrets and configuration management tool. It keeps your configuration securely and automatically in sync for all your developers and servers.

privy - An easy, fast lib to correctly password-protect your data

Privy is a small and fast utility for password-protecting secret data such as API keys, cryptocurrency wallets, or seeds for digital signatures.Say for example you are using GnuPG. You are about to sign a message but it first requires your password. Does your password become the input to instantiate your private key? No, it is first hashed by a secure key derivation function. That hash then becomes the input to a symmetric cipher such as AES which then decrypts your stored private key. That is what Privy does.

vault-client - A command-line interface to HashiCorp's Vault

vc is a command-line interface to HashiCorp's Vault inspired by pass.To build vault-client you need a Go compiler and Git.

envkey-node - EnvKey's official Node.js client library

Integrate EnvKey with your Node.js projects to keep api keys, credentials, and other configuration securely and automatically in sync for developers and servers.Generate an ENVKEY in the EnvKey App. Then set ENVKEY=..., either in a gitignored .env file in the root of your project (in development) or in an environment variable (on servers).

envkey-source - Set OS-level shell environment variables with EnvKey

Integrate EnvKey with any language, either in development or on a server, by making your configuration available through the shell as environment variables.envkey-source compiles into a simple static binary with no dependencies, which makes installation a simple matter of fetching the right binary for your platform and putting it in your PATH. An install.sh script is available to simplify this.

now-env - Use `now.json` environment variables while developing

With the help of this package, you can easily set environment variables for the use in development.If you're already using a now.json file or the now key in package.json, the env sub property will be assigned to process.env automatically.

Cryptex - Secure secret storage and cryptographic key retrieval for Node.js

If you check database passwords into git, download credential files from S3 or some other server, provide plaintext keys to your continuous integration/deployment solution, or don't have the ability to limit engineers from getting production secrets, stop doing what you're doing. Following 12 Factor? Rock on. We have env var support already built-in.

envenc - Seamlessly encrypt and decrypt your development keys in your .env

The 1Password for development environment variables.Seamlessly encrypt and decrypt your development keys in your .env.

qconf - Painless configuration with defaults file, environment variables, arguments, function parameters

Painless configuration for Node apps with defaults file, environment variables, arguments, function parameters.Got sick of the complexity of nconf. Don't try to be everything to everybody. Just get a simple job done with simple code.

jwt-cracker - Simple HS256 JWT token brute force cracker

Simple HS256 JWT token brute force cracker. Effective only to crack JWT tokens with weak secrets. Recommendation: Use strong long secrets or RS256 tokens.

node-credstash - Module for reading credstash secrets

This module is for environments where you are using credstash to store secrets, and you want to read secrets within node without installing python. The module could be used within your node module to retrieve, for instance, database connection credentials from credstash. Credstash support versioning of secrets which allows to easily rotate secrets.

vault-secrets-gen - A Vault secrets plugin for generating high entropy passwords and passphrases.

The Vault Password Generator is a Vault secrets plugin for generating cryptographically secure passwords and passphrases. This is both a real custom Vault secrets plugin, and an example of how to build, install, and maintain your own Vault secrets plugin.

terraform-provider-credstash - Terraform provider for secrets stored with credstash

Read secrets stored with credstash. AWS credentials are not directly set. Use one of the methods discussed here.

airgap - Offline LiveUSB to generate and manage secret keys for things such as gpg, certificates, and cryptocurrency

A live debian based distribution designed for managing secrets offline. Built for those of us that want to be -really- sure our most important secrets are managed in a clean environment with an "air gap" between us and the internet.

helm-secrets - A helm plugin that help manage secrets with Git workflow and store them anywhere

Developed and used in all environments in BaseCRM. We store secrets and values in helm_vars dir structure just like in this repository example dir. All this data versioned in GIT. Working in teams on multiple projects/regions/envs and multiple secrets files at once. We have Makefile in our Helm charts repo to simplify install helm-secrets plugin with helm and other stuff we use. Same Makefile used to rebuild all helm charts with dependencies and some other everyday helpers. Encrypting, Decrypting, Editing secrets on local clones, making #PR's and storing this in our helm charts repo encrypted with PGP, AWS KMS and GCP KMS. Deploying using helm-wrapper from local or from CI with same charts and secrets/values from GIT repository.