A lightweight CLI tool to securely store, manage, and export your sensitive key-value secrets — backed by AES encryption and built with Go.
- 🔒 AES-GCM encryption for secure secret storage
- 📁 Automatically stores data in
~/.apimanager/data.json
- 🗃️ Easily add, list, and delete secrets
- 🧪
.env
file generation for smooth dev setup - ⚡ Blazing fast CLI built with native Go
Flag | Description |
---|---|
-add |
Add a new key-value pair in the format KEY:VALUE |
-edit |
Edit an existing key's value using the format KEY:VALUE |
-delete |
Delete a key and its associated value using the key name |
-env |
Generate a .env file containing all saved and decrypted key-value pairs |
-list |
Display all currently saved (encrypted) key names |
- Manage API keys securely without storing them in plaintext or code
- Share secrets across projects by generating
.env
files - Quickly switch environments by editing saved key-value pairs
- Integrate in scripts and pipelines for automated secret injection
- CLI-based secrets vault without needing cloud services like Vault or AWS Secrets Manager
#After Downloading File
go install .
# Add secrets securely
dvault --add OPENAI_KEY:sk-abc1234xyz
dvault --add DB_PASSWORD:supersecurepass
# List saved keys
dvault --list
# Edit a saved key
dvault --edit DB_PASSWORD:ultrasecure456
# Delete a key
dvault --delete OPENAI_KEY
# Generate .env file for local use
dvault --env
# Load the .env file into your shell
source .env