Skip to content

opaqueSecrets vault for AI agents

Secrets live on the server — never in .env files, never in LLM context. One Ed25519 keypair. Zero leaks.

Install in 60 seconds

bash
# Install the CLI
npm install -g @florianjs/opaque-cli

# Point it at your vault
export OPAQUE_VAULT_URL="https://vault.example.com"
export OPAQUE_ADMIN_TOKEN="<your admin token>"

# Register your app — prints OPAQUE_PRIVATE_KEY
opaque register --project my-app

# Add a secret
opaque set --project my-app --env production DATABASE_URL=postgres://...

Then add three env vars to your app:

bash
OPAQUE_PRIVATE_KEY="<printed by opaque register>"
OPAQUE_VAULT_URL="https://vault.example.com"
OPAQUE_PROJECT="my-app"

That is all your app needs. At boot, the SDK signs a request, fetches all secrets, and injects them into process.env. Your application code reads from process.env as usual.

Self-hosted by design

opaque is not a SaaS product. You run the vault on your own infrastructure — a VPS, a Docker container, Fly.io, or anywhere Bun runs. Your secrets never leave your control.

MIT License