Stop DMing credentials

Make security easy.

curl -fsSL https://getenvv.com/envv | sh
Encrypted We can't read it
Works Offline After first pull
Easy Onboarding Invite, pull, run
terminal
curl -fsSL https://getenvv.com/envv | sh
Installed to /usr/local/bin/envv
envv auth register
Email: ada@startup.io
Key generated. You're in.
envv push .env.production --env prod
Encrypted for N team members
envv run -- npm start
Secrets in memory. Server running.
Zero plaintext on disk.

See It In Your Stack

Update Secrets Without the Ceremony

Change one key or all of them. Re-encrypts automatically.

$ envv secrets set
surgical

Change one key. Don't touch the rest.

$ envv edit
full edit

Opens in $EDITOR. Change anything. Save to re-encrypt.

$ envv pull --decrypt
transitioning

Writes to .env for local dev. Keep it gitignored.

Sound Familiar?

Path of Least Resistance

Your team stores secrets in plaintext because plaintext is faster. The tool you're not using already chose for you.

Slack as Key Management

"DM me the prod creds?" We've all sent that message. There wasn't a better way that was also easy.

Access Drift

That dev who just left β€” what did they have access to? You need to know, and you need to rotate those keys. envv tracks it and makes rotation one command.

The Enterprise Trap

Vault is powerful. It's also a full-time job. You don't have a security team. You have a team that also handles security.

Your Machine. Your Keys. Our Sync.

Encrypt locally. Sync via our backend. Decrypt only in memory.

Your Machine

  • envv run decrypts in memory
  • Cached in .envv/ (encrypted)
  • Strong encryption (AES-256)
  • Private keys never leave
  • Works offline after first pull
--

envv Backend

  • Stores encrypted secrets
  • Cannot decrypt (zero-knowledge)
  • Team membership + public keys
  • Audit logs
  • You only see your own data

We Store What We Cannot Read

Your secrets live on our servers. We have no idea what they are.

Secrets are encrypted on your machine using your team's public keys. Only team members with matching private keys can decrypt. If our servers get breached, attackers get ciphertext they can't use.

Zero Knowledge

We store ciphertext. We can't decrypt it.

Client-Side Encryption

Encryption happens locally. We never see plaintext.

Built on SOPS

Mozilla's proven crypto since 2015.

What Changes

Easy Onboarding

Invite, register, re-push, pull, run the app. No waiting around for someone to send credentials.

Real Encryption

AES-256-GCM. Industry standard, not marketing copy.

Audit Trail

Who accessed prod credentials last Tuesday? Now you know.

Git-Friendly

Each key encrypted separately. Change one secret, see one line change. Meaningful diffs.

CLI First

Scripts. CI/CD. Local dev. One interface for secrets.

Works Offline

Pull once, run anywhere. Cached secrets work offline β€” airplane mode, flaky wifi, air-gapped CI.

The Easy Path Is the Secure Path

Security fails when it's extra work. So we made it the default.

Encrypted by default

No extra steps. Push encrypts. Pull decrypts. The secure way is just the way it works.

One source of truth

Not six copies in six places. One versioned, audited source. Always know what's current.

Share commands, not secrets

envv run β€” that's what goes in chat. The secrets stay encrypted.

Offboarding in one command

Someone leaves? envv rotate. Keys updated, access revoked, audit logged.

No plaintext on disk

Secrets decrypt in memory, inject into your process, vanish. Nothing to leak.

Why Not Just...

use raw SOPS?

We're built on SOPS, it's great. envv is the team layer SOPS doesn't have: key distribution, audit trail, team management, and simple re-encrypting when people leave.

use Vault?

Vault is powerful and complex. You'll likely need someone (or a platform team) to run it, upgrade it, back it up. 10-person startups shipping product don't need that overhead.

use Doppler / Infisical?

Solid products. But they see your secrets in plaintext and updating requires a web UI. We can't read yours. If zero-knowledge matters to you, that's the difference.

use 1Password?

You're still usually left copy-pasting secrets in plaintext to your local .env and GitHub Actionsβ€”not a great workflow. envv is CLI-native, built for automation.

Pricing

Flat pricing, not per seat. Your whole team, one price.

Solo

$12/month

For individuals & pairs

  • End-to-end encryption
  • Audit trail
  • Unlimited secrets
  • Cancel anytime

Questions?

Not sure if envv fits your workflow? Have a specific use case? Just want to chat about secrets management?

We read every message. No sales pitch β€” just honest answers about what envv can and can't do for you.

No Lock-In

Your keys, your data, standard formats.

You Own Your Keys

Your private key lives on your machine at ~/.config/sops/age/keys.txt. We never see it. You control access β€” always.

Standard Encryption

We use SOPS + age β€” open source, battle-tested. Your encrypted files work with standard SOPS tooling. No proprietary format, no lock-in.

Export Anytime

envv pull downloads your encrypted secrets. They're yours. Decrypt locally with your key anytime β€” no network, no backend, no us.

We're the Convenience Layer

envv handles team management and sync. The cryptography is standard SOPS. We make it easy β€” we're not the lock on your data.

Get Started

curl -fsSL https://getenvv.com/envv | sh

Windows? irm https://getenvv.com/install.ps1 | iex

14-day free trial, no card required.