Run apps with secrets — without ever storing
.envfiles on your server.
VaultSync CLI lets you securely deliver secrets to your applications by encrypting them locally and injecting them into processes at runtime. Plaintext never leaves your machine and is never written to disk on the server.
vaultsync secrets push --label API --env prod --file .env
vaultsync run --label API --env prod -- node app.jsNo .env files on your server. No secrets on disk.
Developer machine VaultSync Server VPS Agent
───────────────── ──────────────── ─────────
vaultsync secrets push ───────► stores AES ciphertext
vaultsync grant ───────► stores RSA-wrapped AES key
│
▼
vaultsync run ──► decrypts in RAM ──► injects into process env
- CLI encrypts your
.envfile locally with AES-256-GCM - Only ciphertext is sent to the server — plaintext is never exposed
- AES key is wrapped with each machine's RSA public key
- Secrets are decrypted only in memory on the VPS
- Secrets are zeroed after process exit
npm install -g vaultsync-cliRequires Node.js 18+
Deploy the server and note your API key.
vaultsync login --key <YOUR_API_KEY>Credentials are saved to ~/.vaultsync/config.json (mode 600).
For self-hosted deployments:
VAULTSYNC_SERVER=https://your-vault-server.com vaultsync login --key <YOUR_API_KEY>vaultsync secrets push --label API-Backend --env Production --file .envThe AES key is stored locally and never sent to the server.
vaultsync machine create --name production-01Returns a one-time enrollment token (OTET).
curl -fsSL https://cdn.jsdelivr.net/gh/KingVics/vaultsync-releases@main/install.sh | sudo bash
vaultsync enroll <OTET>vaultsync grant --machine production-01 --label API-Backend --env Productionvaultsync run --label API-Backend --env Production -- node dist/index.jsSecrets are injected into environment variables and never written to disk.
- 🔐 Secrets encrypted before leaving your machine
- 🧠 Server stores only ciphertext — never plaintext
- ⚡ Runtime injection (no
.envfiles on servers) - 🔑 Per-machine access using RSA keypairs
- 🧹 Secrets wiped from memory after execution
VaultSync is a lightweight alternative to:
- HashiCorp Vault
- Doppler
- Infisical
Unlike traditional tools, VaultSync:
- requires no heavy infrastructure
- avoids storing plaintext secrets anywhere
- injects secrets directly into process memory
vaultsync login --key <apiKey>secrets push→ encrypt + upload.envsecrets list→ view stored blobssecrets delete→ remove secrets
machine create→ create + enrollment tokenmachine list→ list machinesmachine revoke→ block accessmachine delete→ remove machine
vaultsync grant --machine <name> --label <label> --env <environment>Re-run
grantafter eachsecrets push
vaultsync audit- AES-256-GCM encryption for secret blobs
- RSA-4096 (OAEP SHA-256) for key wrapping
- Challenge-response authentication (no passwords)
- Replay protection using Redis (short-lived nonce)
- Zero-disk (runtime): secrets decrypted only in memory on the VPS
- Per-machine access control
secrets management, dotenv alternative, environment variables, nodejs secrets, vps deployment, encryption cli, zero trust security
MIT