git-secret
vaultwarden
git-secret | vaultwarden | |
---|---|---|
22 | 489 | |
3,621 | 32,926 | |
- | - | |
5.7 | 8.8 | |
9 days ago | 9 days ago | |
Shell | Rust | |
MIT License | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
git-secret
-
Gittuf – a security layer for Git using some concepts introduced by TUF
I've happily been using git-secret (https://sobolevn.me/git-secret/) for encrypting non-critical (i.e. non-production) secrets for a while now. It sounds like Gittuf will do a lot more than git-secret, but for the use case of encrypted files specifically, is there a significant different about with the approach that Gittuf has taken?
-
Ansible-based dotfiles with fancy nvchad-based neovim + tmux setup
Secrets inside the repo. All the credentials, ssh keys, VPN configs can be stored directly in the repo with support of the git secret. gpg key is optional: config works fine if it is not provided and secrets are not decrypted.
-
Modern Perl Catalyst: Docker Setup
You might notice that some of the environmental variables have funky values that look more like template placeholders. For example "SESSION_STORAGE_SECRET=${SESSION_STORAGE_SECRET}". That's because there's a .env file that contains those (you can see it in the root of the GitHub repository page. As a good practice I try to isolate anything that needs to be secret right off the top. So even though this is a development setup and would need work to turn it into a something suitable for production let's try to start off right not doing the wrong thing by hardcoding all our secrets into various files. At least now there's just one file to secure. And later on if you move to something really secure like Hashicorp's Vault product, or even something open source like git secret you won't have to hunt all over the place for the secrets to keep. Lets now look at the rest of the Catalyst application setup:
-
Terraform - How do you handle secrets?
Checkout git-secret. https://git-secret.io/
-
[2022][Friendly Reminder] Don't commit your input files to Git
There‘s plugins like https://github.com/AGWA/git-crypt or https://git-secret.io that you can use to encrypt the files for yourself, so that they are available on multiple machines to you
- how to automate the sharing .env file with the team?
-
How to hide changes in GitHub repository from the public?
If you really want to have private repositories in GitHub, you will need to set up something like https://git-secret.io on top of git.
- Using GNU Stow to manage your dotfiles (2012)
-
Would it be worth using a secrets management system?
If you want a low config solution and not scared of gpg, https://git-secret.io/
-
git-secret vs Mozilla SOPS?
Hey guys, so I'm using git-secret as of now. Just stumbled across Mozilla SOPS today and finding it interesting. Which one you guys recommend and why? Advantages and disadvantages of each? I think SOPS is more robust and stable since it is being maintained by a large organization? Please correct me if I'm wrong. Help is appreciated.
vaultwarden
-
Bitwarden
To people who want to self-host this, look at Vaultwarden which is a fully compatible alternate server with even more features:
https://github.com/dani-garcia/vaultwarden
Been running it for a year with 0 issues.
- Vaultwarden issue on sysnology
-
What program(s) do you use to remember passwords, including crypto?
For passwords and 2FA I use Bitwarden in combination with a self-hosted Vaultwarden service (for imcreased security and use of pro features for free).
- Comment gérez-vous vos mots de passe ?
-
List of your reverse proxied services
Vaultwarden as Password-Safe
-
Open Source: An Antidote to Closed Source Vulnerability
I have a lot of software that I host myself on my home server, partly to save money but also because I want to control my own data. For example, I host VaultWarden which is the open source server for BitWarden. This gives me all the premium features for free with the added bonus of keeping my passwords out of the cloud.
- Vaultwarden 1.30.0 released with passkey support
- Vaultwarden: Unofficial Bitwarden Compatible Server
-
Bitwarden: Free, open-source password manager
Self hosting is incredibly easy with vaultwarden (https://github.com/dani-garcia/vaultwarden)
-
Your privacy is optional
I have now switched to using the BitWarden app with the self-hosted VaultWarden server. I have set it up, so my passwords are only accessible when connected to my home network either physically or with a VPN (I am using tailscale for this).
What are some alternatives?
sops - Simple and flexible tool for managing secrets
Bitwarden - The core infrastructure backend (API, database, Docker, etc).
secret - Share Secrets securily
Passbolt - Passbolt Community Edition (CE) API. The JSON API for the open source password manager for teams!
Blackbox - Safely store secrets in Git/Mercurial/Subversion
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
git-crypt - Transparent file encryption in git
keepassxc - KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
passff - zx2c4 pass manager extension for Firefox, Chrome and Opera
authelia - The Single Sign-On Multi-Factor portal for web apps
passff-host - Host app for the WebExtension PassFF
Nextcloud - ☁️ Nextcloud server, a safe home for all your data