Encrypted vault for your .env files. Sync across projects with one command. Share securely. Your secrets never leave your device unencrypted.
Free 7-day trial · No credit card required
Everything you need to manage secrets properly.
AES-256-GCM with PBKDF2 key derivation. Encrypted on your device before upload. We literally cannot read your secrets.
Sync .env files to the cloud and pull them to any machine. Like git for secrets — one command to push, one to pull.
One-time encrypted links with expiry and view limits. No more API keys in Slack DMs or email threads.
Three commands. That's it.
Install globally via npm.
Connect a project folder and import your existing .env.
Sync secrets to any machine, any environment.
Start free. Upgrade when you need more.
All trials include full Pro access for 7 days. No credit card required.
No. Encryption happens on your device using AES-256-GCM. We only store encrypted ciphertext. Without your passphrase, the data is meaningless to us.
No. You get 7 days of full Pro access completely free — no credit card required. Upgrade only if you want to continue after the trial.
Your data cannot be recovered. This is by design — zero-knowledge architecture means only you hold the key. We recommend storing your passphrase in a password manager.
Free for 1 project with 5 variables. Pro is $5.99/mo for 15 projects and 40 variables per project.
Your account switches to the Free plan (1 project, 5 variables). Your data is never deleted. Upgrade to Pro to unlock full access again.
Yes. The entire project is MIT licensed and available on GitHub. You can inspect the encryption code and self-host if you prefer.
Yes. Use `keyra-cli pull --file .env.production` in your CI pipeline. Authenticate with your API token stored as a CI secret.
More than just a vault — a security system for your secrets.
AES-256-GCM on your device. Your plaintext secrets never reach our servers.
Pre-commit hook that blocks accidental .env commits before they reach your repository.
Every read, write, and share is logged. Know exactly who accessed what and when.
Vault locks automatically after 15 minutes of inactivity. No sensitive data left exposed.