Envault prioritizes security above all else. Our architecture is designed to ensure that your secrets remain confidential, even in the event of a database compromise. We adhere to the principle of Defense in Depth.
Impact: Critical.
If an attacker gains full shell access to the running server, they can read the ENCRYPTION_KEY from the environment.
Mitigation: Use a hardened infrastructure provider (e.g., Vercel, AWS ECS). Restrict access to the production environment. Envault does not store decrypted secrets on disk.
The attacker might have access to the local .env file if it was pulled.
Mitigation: envault pull does not persist credentials permanently. Revoke the user's access immediately via the dashboard to prevent fetching new secrets.