So I built Liberty - a CLI tool that replaces .env files with hardware-bound encryption.
How it works:
$ pip install liberty-secrets
$ liberty add DATABASE_URL postgresql://...
$ liberty add STRIPE_KEY sk-...
$ liberty exec npm start
Secrets are encrypted with a key derived from your machine's hardware (CPU ID
+ machine ID + disk serial). If someone steals your .liberty vault file, it's useless on their machine.Features:
- Hardware-bound AES-256-GCM encryption
- Complete audit trail (compliance-ready)
- Works offline (no servers, no accounts)
- Global vault (~/.liberty/ works from any directory)
- MIT licensed, free for individual use
GitLab: https://gitlab.com/deciphergit/libertyPyPI: https://pypi.org/project/liberty-secrets/
Team features (secret sharing) coming soon as paid tier.
Feedback welcome!
nosuchthing•3w ago
ZeroConcerns•3w ago
Basically, it rebuilds Windows DPAPI from first principles, which is fine (I've done it many times myself!), and something non-Windows platforms sorely need. It changes the impact of malware from "they dumped all our secrets from prod to their C2" to "they got some encrypted values, and now someone will need to figure out our methodology and underlying keys", which is a meaningfully higher bar.