| Crates.io | anubis-vault |
| lib.rs | anubis-vault |
| version | 0.2.0 |
| created_at | 2025-10-10 08:42:24.251551+00 |
| updated_at | 2025-10-10 11:12:53.2524+00 |
| description | Post-quantum secure secrets manager with ML-KEM-1024, ML-DSA-87, zero-knowledge proofs, Shamir sharing, and memory protection. The ultimate security vault. |
| homepage | https://github.com/AnubisQuantumCipher/anubis-vault |
| repository | https://github.com/AnubisQuantumCipher/anubis-vault |
| max_upload_size | |
| id | 1876687 |
| size | 358,143 |
The World's Most Secure Secrets Manager Guardian of Secrets - Protected by Quantum-Resistant Cryptography
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ ๐ ANUBIS VAULT ๐ โ
โ Guardian of Secrets โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ Quantum Cipher Division โ
โ 5 Layers of Ultimate Security Protection โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Like Anubis, the ancient Egyptian guardian who protected the gates of the underworld and weighed the hearts of souls, Anubis Vault stands as the ultimate guardian of your digital secrets. No oneโnot even quantum computers or nation-state actorsโcan breach its defenses.
Anubis Vault is not just another password manager. It's a military-grade, quantum-resistant secrets management system designed for developers, security professionals, and anyone who demands the highest level of protection for sensitive data.
| Layer | Technology | Protection Against |
|---|---|---|
| 1. Classical Cryptography | XChaCha20-Poly1305, Argon2id, X25519, Ed25519, BLAKE3 | Brute-force, rainbow tables, timing attacks |
| 2. Post-Quantum Cryptography | ML-KEM-1024, ML-DSA-87 (NIST Standards) | Quantum computers (Shor's algorithm) |
| 3. Zero-Knowledge Proofs | Plonky3 STARKs, Fiat-Shamir transforms | Privacy-preserving audit trails |
| 4. Shamir Secret Sharing | Threshold M-of-N recovery | Single point of failure, key loss |
| 5. Memory Protection | mlock, VirtualLock, zeroization | Memory dumps, swap attacks, core dumps |
Plus:
cargo install anubis-vault
This single command downloads and compiles all security layers in one unified crate:
No feature flags needed. Everything is included.
git clone https://github.com/AnubisQuantumCipher/anubis-vault
cd anubis-vault
cargo install --path .
anubis-vault --version
# Should output: anubis-vault 0.1.0
anubis-vault init
This creates your encrypted vault at ~/.anubis-vault and prompts you to set a master password.
Security Note: Choose a strong master password (20+ characters). This is the only key that can decrypt your secrets.
# Interactive prompt (most secure - doesn't appear in shell history)
anubis-vault add API_KEY
# From command line (less secure - appears in shell history)
anubis-vault add DATABASE_URL --value "postgresql://user:pass@localhost/db"
# From stdin
echo "secret-token" | anubis-vault add GITHUB_TOKEN --stdin
# From file
cat ~/.ssh/id_rsa | anubis-vault add SSH_PRIVATE_KEY --stdin
# Check if secret exists (doesn't show value)
anubis-vault get API_KEY
# Show the secret value in terminal
anubis-vault get API_KEY --show
# Copy to clipboard (doesn't print to terminal)
anubis-vault get API_KEY --clip
# Output as JSON
anubis-vault get API_KEY --format json
# Simple list
anubis-vault list
# Detailed view with metadata
anubis-vault list --long
# JSON output
anubis-vault list --format json
# Generate 24-character random secret
anubis-vault generate
# Custom length (64 characters)
anubis-vault generate --length 64
# Include symbols
anubis-vault generate --length 32 --symbols
# Generate and copy to clipboard
anubis-vault generate --clip
anubis-vault delete API_KEY
anubis-vault info
Shows:
The killer feature for developers. Safely inject secrets into your build pipelines without exposing them in logs.
# Inject all secrets as environment variables
anubis-vault inject -- ./deploy.sh
# Inject specific secrets
anubis-vault inject --only API_KEY,DATABASE_URL -- npm run build
# In your script, secrets are available as $API_KEY, $DATABASE_URL, etc.
How it works:
Split your master password into N shares, requiring M shares to recover. Perfect for backup and multi-party authentication.
# Create 5 shares, require 3 to recover
anubis-vault share --threshold 3 --total 5
# Distribute shares to trusted parties (outputs: share1.txt, share2.txt, ...)
# Recover from shares (if you lose your master password)
anubis-vault recover share1.txt share3.txt share5.txt
Use cases:
Every operation (add, get, delete) is logged in a tamper-proof audit trail.
# View audit log
anubis-vault audit
# Verify audit log integrity
anubis-vault audit --verify
# Export audit log
anubis-vault audit --export audit.json
How it works:
Protect against quantum computer attacks using NIST-approved post-quantum algorithms.
Automatically enabled for all secrets. No configuration needed.
ML-KEM-1024 (Module-Lattice-Based Key Encapsulation Mechanism)
ML-DSA-87 (Module-Lattice-Based Digital Signature Algorithm)
Prove you have access to a secret without revealing it. Powered by Plonky3 ultra-fast STARKs.
# Generate a proof of access (without revealing the secret)
anubis-vault prove API_KEY
# Verify the proof
anubis-vault verify-proof proof.json
Use cases:
Secrets are locked in physical RAM and automatically zeroized.
Automatically enabled on all platforms:
mlock() prevents swap to diskVirtualLock() locks pages in memoryRLIMIT_CORE = 0)# Use environment variable
export ANUBIS_VAULT_PATH=~/projects/my-vault.anubis
anubis-vault add SECRET
# Or command-line flag
anubis-vault --vault ~/projects/my-vault.anubis add SECRET
| Purpose | Algorithm | Parameters |
|---|---|---|
| Encryption | XChaCha20-Poly1305 | 256-bit keys, 192-bit nonces, AEAD |
| Key Derivation | Argon2id | 64 MiB memory, 3 iterations, parallelism=4 |
| Key Exchange | X25519 | Curve25519 ECDH |
| Signatures | Ed25519 | EdDSA on Curve25519 |
| Hashing | BLAKE3 | 256-bit output, Merkle trees |
| Purpose | Algorithm | Security Level |
|---|---|---|
| Key Encapsulation | ML-KEM-1024 | NIST Level 5 (256-bit quantum) |
| Digital Signatures | ML-DSA-87 | NIST Level 5 (256-bit quantum) |
| Framework | Algorithm | Performance |
|---|---|---|
| Plonky3 | STARK over Baby Bear field | 100x faster than Plonky2 |
| Hash Function | Poseidon2 | STARK-friendly |
| Commitment | FRI (Fast Reed-Solomon IOP) | Transparent (no trusted setup) |
โ Protected Against:
โ NOT Protected Against:
+------------------------+
| Magic Bytes (4B) | "ANBS" (Anubis)
+------------------------+
| Format Version (4B) | 0x00000001
+------------------------+
| KDF Parameters | Argon2id salt (32B) + params
+------------------------+
| PQ Public Key (1568B) | ML-KEM-1024 public key
+------------------------+
| Encrypted Master Key | XChaCha20-Poly1305 encrypted
+------------------------+
| Secret Count (4B) | Number of secrets
+------------------------+
| Secret 1 Encrypted | Nonce (24B) + Ciphertext + Tag (16B)
+------------------------+
| Secret 2 Encrypted |
+------------------------+
| ... |
+------------------------+
| Audit Log | Merkle tree + signatures
+------------------------+
Computational Security:
Breaking Anubis Vault would require:
Time to crack (assuming 1 trillion attempts per second):
Verdict: Computationally infeasible to crack, even with future quantum computers.
# Initialize vault for project
cd ~/my-project
export ANUBIS_VAULT_PATH=./.vault.anubis
anubis-vault init
# Store API keys
anubis-vault add STRIPE_SECRET_KEY
anubis-vault add AWS_ACCESS_KEY_ID
anubis-vault add AWS_SECRET_ACCESS_KEY
# Inject into deployment script
anubis-vault inject -- ./deploy.sh
# In deploy.sh:
# curl -H "Authorization: Bearer $STRIPE_SECRET_KEY" ...
# Create vault with critical credentials
anubis-vault init
anubis-vault add PRODUCTION_DB_PASSWORD
# Create recovery shares (3 of 5 threshold)
anubis-vault share --threshold 3 --total 5
# Distribute shares:
# - share1.txt โ Alice
# - share2.txt โ Bob
# - share3.txt โ Charlie
# - share4.txt โ David
# - share5.txt โ Eve
# If master password is lost, any 3 people can recover:
anubis-vault recover share1.txt share3.txt share5.txt
# Enable audit logging (enabled by default)
anubis-vault add HIPAA_ENCRYPTION_KEY
anubis-vault get HIPAA_ENCRYPTION_KEY --show
# View audit trail
anubis-vault audit
# Verify integrity
anubis-vault audit --verify
# Export for compliance review
anubis-vault audit --export compliance-audit-2024.json
# Store SSH private key
cat ~/.ssh/id_rsa | anubis-vault add SSH_PRIVATE_KEY --stdin
# Retrieve and use
anubis-vault get SSH_PRIVATE_KEY --show | ssh-add -
# Or inject into script
anubis-vault inject -- ssh-add <(anubis-vault get SSH_PRIVATE_KEY --show)
| Operation | Time | Notes |
|---|---|---|
| Init vault | ~500ms | Argon2id KDF (one-time) |
| Add secret | ~100ms | Includes encryption + audit log |
| Get secret | ~100ms | Includes decryption + signature verification |
| List secrets | ~50ms | Metadata only (no decryption) |
| Generate | <1ms | CSPRNG |
| Inject | ~200ms | Includes full decryption + process spawn |
System Requirements:
| Variable | Description | Default |
|---|---|---|
ANUBIS_VAULT_PATH |
Path to vault file | ~/.anubis-vault |
ANUBIS_NO_COLOR |
Disable colored output | false |
ANUBIS_LOG_LEVEL |
Log verbosity (error, warn, info, debug) | info |
All commands support:
--vault <path> - Custom vault location--quiet - Suppress non-essential output--help - Show detailed helpAnubis Vault can be used as a Rust library in your own projects.
[dependencies]
anubis-vault = "0.1"
use anubis_vault::{Vault, Secret};
// Initialize vault
let vault = Vault::new("~/my-vault.anubis")?;
vault.init("my-master-password")?;
// Add secret
let secret = Secret::new("API_KEY", "secret-value");
vault.add(secret)?;
// Retrieve secret
let secret = vault.get("API_KEY")?;
println!("Value: {}", secret.reveal());
// List all secrets
let secrets = vault.list()?;
for secret in secrets {
println!("{}", secret.name);
}
See docs.rs/anubis-vault for complete API documentation.
Contributions are welcome! This project is part of the Anubis Quantum Cipher security suite.
git clone https://github.com/AnubisQuantumCipher/anubis-vault
cd anubis-vault
cargo build
cargo test
# Unit tests
cargo test
# Integration tests
cargo test --test '*'
# Benchmarks
cargo bench
cargo tarpaulin --out Html
Dual-licensed under MIT OR Apache-2.0.
You may choose either license at your option.
Part of the Anubis Quantum Cipher security ecosystem:
Built with:
Special thanks to:
v0.2.0 (Q1 2025)
v0.3.0 (Q2 2025)
v1.0.0 (Q3 2025)
"Like Anubis, the ancient guardian who protected the gates of the underworld and weighed the hearts of souls, Anubis Vault stands watch over your secrets, ensuring they remain hidden from allโeven the gods themselves, even quantum computers of the future."
Made with ๐ by Anubis Quantum Cipher Division
Your secrets are safe. Forever.