Phantom Vault

Secrets exist but are never observable.

v1.4.0 — Production Ready

Your AI coding assistant can read your .env files. Every API key, every database password — visible, loggable, leakable. Phantom Vault makes it so your AI can use your secrets without ever seeing them.

Install (Mac & Linux)
curl -fsSL https://phantomvault.riscent.com/install | sh

5-Minute Setup

1

Create Your Vault

Run phantom init and set a master password.

2

Add Your API Keys

Run phantom add openai-key — paste your key when prompted.

3

Connect to Claude Code

Run phantom mcp-install — restarts Claude automatically.

4

Use It Naturally

Tell Claude: "Use my openai-key to check my API balance"

🔐 Hardware-Backed Encryption

Master key lives in Apple Secure Enclave or TPM. No password file exists anywhere.

🛡️ Oracle Attack Prevention

Commands are analyzed before execution. Character-by-character probing is blocked.

🔍 Multi-Encoding Sanitization

Output scanned for secrets in 15+ encodings. Base64, hex, URL-encoded — all caught.

📦 Process Sandboxing

Commands run in network-restricted subprocesses. Secrets die when the process dies.

🪤 Canary Detection

Honeypot secrets detect exfiltration attempts. Get alerted the moment something probes.

🔗 Claude Code + MCP

One command to connect. Your AI agent gets 6 tools — none return plaintext secrets.