Your secrets, your infrastructure,
your control.

A self-hosted secrets manager that ships as a single binary. Open-source, MIT-licensed, and built to replace the complexity of HashiCorp Vault.

Features at a Glance

Everything you need to manage secrets — nothing you don't.

📦

Single Binary, Zero Dependencies

Download one file, write a config, and run. No JVM, no runtime, no sidecar agents. Works on Linux, macOS, and Windows.

🔒

Military-Grade Encryption

AES-256-GCM encryption with per-secret keys. Master key protected by Shamir's Secret Sharing and never written to disk.

🔌

Every Interface You Need

REST API, gRPC API, CLI tool, and a built-in Web UI. Access your secrets however you prefer.

📚

Official SDKs (soon)

Drop-in TypeScript and Python SDKs so your applications can read and write secrets in a few lines of code.

📊

High Availability

Raft-based clustering across multiple nodes with automatic leader election and consistent reads.

📑

Full Audit Trail

Every secret access, token operation, and admin action is logged with timestamp, actor, path, and result.

How It Works

Four steps to managing your secrets.

Initialize

Set up the vault and receive unseal keys.

vv init

Unseal

Submit your key shards to unlock the vault.

vv unseal --key <shard>

Store Secrets

Write key-value pairs to hierarchical paths.

vv secret write apps/prod DB_PASS=s3cret

Read Secrets

Retrieve secrets from any interface.

vv secret read apps/prod

Built for Security

LayerImplementation
Encryption at restAES-256-GCM with per-secret keys
Key protectionShamir's Secret Sharing
Token storageHMAC-SHA256 hashes only
TransportTLS 1.3
Access controlPolicy-based with glob matching
AuditComplete operation log

Built for Performance

MetricTarget
Secret reads> 10,000 req/s per node
Secret writes> 2,000 req/s per node
P99 read latency< 5 ms
P99 write latency< 20 ms
Concurrent connections50,000+

Quick Start

Start a dev server with in-memory storage, auto-initialization, and auto-unseal.

# Start the dev server
vibr8vault --dev

# Configure the CLI
vv config set-address http://localhost:8200
vv config set-token <root-token>

# Write and read a secret
vv secret write hello greeting="world"
vv secret read hello

Up and running in seconds

Dev mode prints a root token to the console. Point your browser to http://localhost:8200/swagger/index.html to explore the API interactively.

All data is ephemeral in dev mode — perfect for testing and local development.

Read the full docs →

Open Source (soon)

Vibr8Vault is MIT-licensed. Use it, modify it, ship it — no strings attached.

Download Vibr8Vault