๐ Anubis Vault ๐
The World's Most Secure Secrets Manager Guardian of Secrets - Protected by Quantum-Resistant Cryptography
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ ๐ ANUBIS VAULT ๐ โ
โ Guardian of Secrets โ
โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ โ
โ Quantum Cipher Division โ
โ 5 Layers of Ultimate Security Protection โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Like Anubis, the ancient Egyptian guardian who protected the gates of the underworld and weighed the hearts of souls, Anubis Vault stands as the ultimate guardian of your digital secrets. No oneโnot even quantum computers or nation-state actorsโcan breach its defenses.
๐ฏ What Makes Anubis Vault Special?
Anubis Vault is not just another password manager. It's a military-grade, quantum-resistant secrets management system designed for developers, security professionals, and anyone who demands the highest level of protection for sensitive data.
๐ 5 Layers of Ultimate Security
| Layer | Technology | Protection Against |
|---|---|---|
| 1. Classical Cryptography | XChaCha20-Poly1305, Argon2id, X25519, Ed25519, BLAKE3 | Brute-force, rainbow tables, timing attacks |
| 2. Post-Quantum Cryptography | ML-KEM-1024, ML-DSA-87 (NIST Standards) | Quantum computers (Shor's algorithm) |
| 3. Zero-Knowledge Proofs | Plonky3 STARKs, Fiat-Shamir transforms | Privacy-preserving audit trails |
| 4. Shamir Secret Sharing | Threshold M-of-N recovery | Single point of failure, key loss |
| 5. Memory Protection | mlock, VirtualLock, zeroization | Memory dumps, swap attacks, core dumps |
Plus:
- โ Cryptographic Audit Logs - Blockchain-like tamper-proof audit trail with Merkle trees
- โ CI/CD Secrets Injection - Safely inject secrets into build pipelines
- โ Zero-Knowledge Architecture - Master password never leaves your device
- โ Offline-First - Works completely offline, no cloud dependencies
- โ Cross-Platform - macOS, Linux, Windows
๐ Installation
From crates.io (Recommended)
This single command downloads and compiles all security layers in one unified crate:
- โ Classical cryptography (XChaCha20-Poly1305, Argon2id)
- โ Post-quantum cryptography (ML-KEM-1024, ML-DSA-87)
- โ Zero-knowledge proofs (Plonky3)
- โ Shamir secret sharing
- โ Memory protection
- โ Audit logging
- โ Clipboard support
No feature flags needed. Everything is included.
From Source
Verify Installation
# Should output: anubis-vault 0.1.0
๐ Quick Start Guide
1. Initialize Your Vault
This creates your encrypted vault at ~/.anubis-vault and prompts you to set a master password.
Security Note: Choose a strong master password (20+ characters). This is the only key that can decrypt your secrets.
2. Add Secrets
# Interactive prompt (most secure - doesn't appear in shell history)
# From command line (less secure - appears in shell history)
# From stdin
|
# From file
|
3. Retrieve Secrets
# Check if secret exists (doesn't show value)
# Show the secret value in terminal
# Copy to clipboard (doesn't print to terminal)
# Output as JSON
4. List All Secrets
# Simple list
# Detailed view with metadata
# JSON output
5. Generate Random Secrets
# Generate 24-character random secret
# Custom length (64 characters)
# Include symbols
# Generate and copy to clipboard
6. Delete Secrets
7. View Vault Information
Shows:
- Vault location
- Number of secrets
- Creation date
- Last modified date
- Encryption algorithms used
- Security features enabled
๐ Advanced Features
CI/CD Secrets Injection
The killer feature for developers. Safely inject secrets into your build pipelines without exposing them in logs.
# Inject all secrets as environment variables
# Inject specific secrets
# In your script, secrets are available as $API_KEY, $DATABASE_URL, etc.
How it works:
- Anubis Vault decrypts secrets in memory
- Sets them as environment variables for the child process
- Runs your command
- Automatically zeroizes memory when done
- Secrets never touch disk or logs
Shamir Secret Sharing (Threshold Recovery)
Split your master password into N shares, requiring M shares to recover. Perfect for backup and multi-party authentication.
# Create 5 shares, require 3 to recover
# Distribute shares to trusted parties (outputs: share1.txt, share2.txt, ...)
# Recover from shares (if you lose your master password)
Use cases:
- Business continuity: Distribute shares to team members
- Personal backup: Store shares in different physical locations
- Legal compliance: Require multiple approvals for sensitive access
Cryptographic Audit Logs
Every operation (add, get, delete) is logged in a tamper-proof audit trail.
# View audit log
# Verify audit log integrity
# Export audit log
How it works:
- Blockchain-like chain of cryptographic hashes
- Each entry is signed with Ed25519
- BLAKE3 Merkle tree for efficient verification
- Impossible to tamper without detection
Post-Quantum Encryption
Protect against quantum computer attacks using NIST-approved post-quantum algorithms.
Automatically enabled for all secrets. No configuration needed.
-
ML-KEM-1024 (Module-Lattice-Based Key Encapsulation Mechanism)
- Quantum security level: 256 bits
- Resistant to Shor's algorithm
- NIST FIPS 203 standard
-
ML-DSA-87 (Module-Lattice-Based Digital Signature Algorithm)
- Quantum-resistant signatures
- NIST FIPS 204 standard
Zero-Knowledge Proofs
Prove you have access to a secret without revealing it. Powered by Plonky3 ultra-fast STARKs.
# Generate a proof of access (without revealing the secret)
# Verify the proof
Use cases:
- Prove you have credentials without exposing them
- Privacy-preserving authentication
- Compliance audits without data disclosure
Memory Protection
Secrets are locked in physical RAM and automatically zeroized.
Automatically enabled on all platforms:
- Unix/Linux:
mlock()prevents swap to disk - Windows:
VirtualLock()locks pages in memory - All platforms:
- Core dumps disabled (
RLIMIT_CORE = 0) - Automatic memory zeroization on drop
- Constant-time operations (timing attack resistant)
- Core dumps disabled (
Custom Vault Location
# Use environment variable
# Or command-line flag
๐ก๏ธ Security Architecture
Cryptographic Algorithms
Classical Cryptography
| Purpose | Algorithm | Parameters |
|---|---|---|
| Encryption | XChaCha20-Poly1305 | 256-bit keys, 192-bit nonces, AEAD |
| Key Derivation | Argon2id | 64 MiB memory, 3 iterations, parallelism=4 |
| Key Exchange | X25519 | Curve25519 ECDH |
| Signatures | Ed25519 | EdDSA on Curve25519 |
| Hashing | BLAKE3 | 256-bit output, Merkle trees |
Post-Quantum Cryptography
| Purpose | Algorithm | Security Level |
|---|---|---|
| Key Encapsulation | ML-KEM-1024 | NIST Level 5 (256-bit quantum) |
| Digital Signatures | ML-DSA-87 | NIST Level 5 (256-bit quantum) |
Zero-Knowledge Proofs
| Framework | Algorithm | Performance |
|---|---|---|
| Plonky3 | STARK over Baby Bear field | 100x faster than Plonky2 |
| Hash Function | Poseidon2 | STARK-friendly |
| Commitment | FRI (Fast Reed-Solomon IOP) | Transparent (no trusted setup) |
Threat Model
โ Protected Against:
- Brute-force attacks (Argon2id makes it computationally infeasible)
- Quantum computer attacks (ML-KEM-1024, ML-DSA-87)
- Memory dumps (mlock + zeroization)
- Swap attacks (memory locking)
- Core dumps (disabled via RLIMIT_CORE)
- Timing attacks (constant-time operations)
- Tampering (Poly1305 MAC + Ed25519 signatures)
- Rainbow tables (unique salts per secret)
- Side-channel attacks (constant-time crypto)
โ NOT Protected Against:
- Physical access to unlocked device (use full-disk encryption)
- Keyloggers (use hardware security keys)
- Compromised operating system (use secure boot)
- $5 wrench attack (use Shamir sharing to distribute trust)
Vault File Format
+------------------------+
| Magic Bytes (4B) | "ANBS" (Anubis)
+------------------------+
| Format Version (4B) | 0x00000001
+------------------------+
| KDF Parameters | Argon2id salt (32B) + params
+------------------------+
| PQ Public Key (1568B) | ML-KEM-1024 public key
+------------------------+
| Encrypted Master Key | XChaCha20-Poly1305 encrypted
+------------------------+
| Secret Count (4B) | Number of secrets
+------------------------+
| Secret 1 Encrypted | Nonce (24B) + Ciphertext + Tag (16B)
+------------------------+
| Secret 2 Encrypted |
+------------------------+
| ... |
+------------------------+
| Audit Log | Merkle tree + signatures
+------------------------+
Security Guarantees
Computational Security:
Breaking Anubis Vault would require:
- 2^256 operations to brute-force the master password (with 64 MiB RAM per attempt)
- 2^256 quantum operations against ML-KEM-1024
- 2^256 classical operations against XChaCha20-Poly1305
Time to crack (assuming 1 trillion attempts per second):
- Classical computer: 3.67 ร 10^59 years
- Quantum computer: 3.67 ร 10^59 years
- Age of universe: 1.38 ร 10^10 years
Verdict: Computationally infeasible to crack, even with future quantum computers.
๐ Usage Examples
Example 1: Developer Workflow
# Initialize vault for project
# Store API keys
# Inject into deployment script
# In deploy.sh:
# curl -H "Authorization: Bearer $STRIPE_SECRET_KEY" ...
Example 2: Team Secret Sharing
# Create vault with critical credentials
# Create recovery shares (3 of 5 threshold)
# Distribute shares:
# - share1.txt โ Alice
# - share2.txt โ Bob
# - share3.txt โ Charlie
# - share4.txt โ David
# - share5.txt โ Eve
# If master password is lost, any 3 people can recover:
Example 3: Audit Compliance
# Enable audit logging (enabled by default)
# View audit trail
# Verify integrity
# Export for compliance review
Example 4: SSH Key Management
# Store SSH private key
|
# Retrieve and use
|
# Or inject into script
๐ Performance
| Operation | Time | Notes |
|---|---|---|
| Init vault | ~500ms | Argon2id KDF (one-time) |
| Add secret | ~100ms | Includes encryption + audit log |
| Get secret | ~100ms | Includes decryption + signature verification |
| List secrets | ~50ms | Metadata only (no decryption) |
| Generate | <1ms | CSPRNG |
| Inject | ~200ms | Includes full decryption + process spawn |
System Requirements:
- RAM: 128 MiB minimum (for Argon2id)
- Disk: 10 MB for binary + storage for vault file
- Rust: 1.70 or later
๐ง Configuration
Environment Variables
| Variable | Description | Default |
|---|---|---|
ANUBIS_VAULT_PATH |
Path to vault file | ~/.anubis-vault |
ANUBIS_NO_COLOR |
Disable colored output | false |
ANUBIS_LOG_LEVEL |
Log verbosity (error, warn, info, debug) | info |
Command-Line Flags
All commands support:
--vault <path>- Custom vault location--quiet- Suppress non-essential output--help- Show detailed help
๐ API Documentation
Anubis Vault can be used as a Rust library in your own projects.
[]
= "0.1"
use ;
// Initialize vault
let vault = new?;
vault.init?;
// Add secret
let secret = new;
vault.add?;
// Retrieve secret
let secret = vault.get?;
println!;
// List all secrets
let secrets = vault.list?;
for secret in secrets
See docs.rs/anubis-vault for complete API documentation.
๐ค Contributing
Contributions are welcome! This project is part of the Anubis Quantum Cipher security suite.
Development Setup
Running Tests
# Unit tests
# Integration tests
# Benchmarks
Code Coverage
๐ License
Dual-licensed under MIT OR Apache-2.0.
You may choose either license at your option.
- MIT License: LICENSE-MIT
- Apache License 2.0: LICENSE-APACHE
๐ Related Projects
Part of the Anubis Quantum Cipher security ecosystem:
- Anubis Rage - Post-quantum file encryption (ML-KEM-1024 + ML-DSA-87)
- Anubis Wormhole - Quantum-secure file transfer with magic wormhole codes
- Quantum Sign - Post-quantum digital signature tool
๐ Acknowledgments
Built with:
- RustCrypto - Cryptographic primitives
- pqcrypto - Post-quantum cryptography (NIST standards)
- Plonky3 - Ultra-fast STARK proving system
- clap - CLI framework
- Argon2 - Password hashing competition winner
Special thanks to:
- NIST for standardizing post-quantum cryptography
- Polygon Zero for Plonky3 ZK-STARK framework
- Rust community for amazing cryptography libraries
๐ Support
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Security: See SECURITY.md for vulnerability reporting
๐ฎ Roadmap
v0.2.0 (Q1 2025)
- Hardware security module (HSM) integration
- Biometric unlock (TouchID, Windows Hello)
- Browser extension for auto-fill
- Mobile apps (iOS, Android)
v0.3.0 (Q2 2025)
- End-to-end encrypted cloud sync
- Multi-device support
- Team vaults with role-based access control
- Yubikey/FIDO2 support
v1.0.0 (Q3 2025)
- Formal security audit by Trail of Bits
- FIPS 140-3 compliance
- GUI application (desktop)
- Enterprise features (SSO, LDAP)
๐ Guardian of Secrets ๐
"Like Anubis, the ancient guardian who protected the gates of the underworld and weighed the hearts of souls, Anubis Vault stands watch over your secrets, ensuring they remain hidden from allโeven the gods themselves, even quantum computers of the future."
Made with ๐ by Anubis Quantum Cipher Division
Your secrets are safe. Forever.