Passwords and secrets.
Zero knowledge.
One platform.
The only platform where the server is structurally incapable of reading your data — built for teams and developers.
Two products. One platform.
Everything your team needs, nothing they don't.
Password Vault
Zero-knowledge credential management for individuals and teams. Every item encrypted on-device before it ever leaves your browser.
- AES-256-GCM encryption
- PBKDF2-SHA256 key derivation
- Browser autofill extension
- iOS & Android apps
- Zero-knowledge team sharing
- MFA & SSO support
Developer Secrets
Projects → Environments → Secrets hierarchy. ECDH machine identities — the server returns only ciphertext, never plaintext secrets.
- securekee run -- <cmd>
- Node.js & Python SDKs
- GitHub Actions (ZK-native)
- ECDH machine identities
- Rotation policies + webhooks
- Secret versioning & audit
The zero-knowledge difference
We structurally cannot read your data.
Not a privacy policy. Not a promise. A cryptographic guarantee built into every layer of the architecture.
Doppler, Infisical, and HashiCorp Vault all return plaintext secrets from their servers to machines. SecureKee's ECDH architecture makes this physically impossible.
Encrypted on your device
Your master password never leaves your machine. Encryption runs locally using AES-256-GCM, derived via PBKDF2-SHA256 with 600,000 iterations.
Only ciphertext reaches us
We store only encrypted blobs. Our servers hold no keys, no backdoors, and have no cryptographic path to your plaintext data.
Decrypted only by you
Your browser or app decrypts on-device. CI machines use ECDH keypairs — the server returns encrypted project keys the CLI decrypts locally.
AES-256-GCM · PBKDF2-SHA256 · ECDH P-256 · Open-source cryptographic implementations
Works everywhere
Every platform your team uses.
Built for developers
Secrets in your workflow.
Inject secrets into any process, fetch them in code, or sync them to GitHub Actions — without the server ever receiving plaintext values.
# Inject all secrets as env vars — zero-knowledge❯ securekee run \--project myapp --env prod \-- node server.js✓ Loading secrets for myapp/prod✓ 14 secrets injected into environment✓ Zero-knowledge — server saw only ciphertext❯ Server listening on :3000
See everything. Read nothing.
Monitor privileged sessions across sensitive applications — in real time. Screenshots are encrypted client-side with RSA-2048 before they leave the browser. Not even SecureKee servers can view them.
Enterprise plan · Per-application control · End-to-end encrypted · Real-time SignalR streaming
How we compare
The only truly zero-knowledge secrets manager.
| Feature | Doppler | Infisical | HCP Vault | SecureKee |
|---|---|---|---|---|
| Server can read secrets | ||||
| Machine zero-knowledge access | ||||
| Client-side decryption (always) | ||||
| Built-in password vault | ||||
| Browser extension & mobile app | ||||
| Self-hostable | ||||
| CLI tool | ||||
| GitHub Actions integration | ||||
| Open-source cryptography | ||||
| Encrypted session monitoring |
Partial support · Based on public documentation as of 2026
Security by design
Paranoid about security? So are we.
Start building
securely today.
Free forever for individuals. 14-day trial for teams.
No credit card required.