Skip to content

Ephemeral, zero-knowledge secret sharing with end-to-end encryption and seamless UX—no sign-up, just secure and instant sharing.

License

Notifications You must be signed in to change notification settings

osbytes/crypt.fyi

A zero-knowledge, end-to-end encrypted secret sharing platform that enables secure transmission of sensitive information.

CI Security Headers Mozilla HTTP Observatory Grade CII Best Practices i18n ✓

Features

  • 🔒 End-to-end encryption using AES-256-GCM
  • 🔒 Strict Content Security Policy (CSP) to prevent XSS attacks and unauthorized resource loading
  • 🔒 Strict rate limits to mitigate brute-force attacks
  • 🤫 Zero-knowledge architecture - server never sees unencrypted data or decryption keys
  • 🔥 Burn after reading w/ provisions to prevent erroneous burns from bots or url introspection
  • ⏰ Automatic expiration (Time-To-Live)
  • 🔑 Password protection
  • 📁 File sharing support w/ drag and drop
  • 🪝 Webhook notifications for read success, read failure, and burn events
  • 🌐 IP/CIDR allow-listing
  • 🔢 Read count limits
  • 📱 QR code generation
  • ⌨️ CLI for interacting with the API
  • 🐳 Docker images for the api server and web client
  • 🌐 Localization with a handful of supported languages (more to come - help wanted!)

How It Works

  1. Encryption key is generated on the client
  2. Password is optionally provided
  3. Encryption key and password are used to encrypt the secret
  4. Encryption key and password are hashed and stored along with the encrypted secret for verification on retrieval - the raw key and password are never stored or transmitted on/to the server
  5. The unique URL containing the decryption key is generated on the client
  6. Share the URL with your recipient and separately the password if specified
  7. When accessed, only when the decryption key and password match via server-side verification of the hashes, the encrypted secret is shared and decrypted in the recipient's browser
  8. Optionally, the secret is automatically destroyed after being read in an atomic read & delete operation guaranteeing only one person can access the secret
  9. If retrieval doesn't happen within the TTL, the secret is automatically destroyed

RFC

API Usage

OpenAPI Specification

Technical Stack

Development

  1. Clone the repository
  2. Install dependencies:
    yarn install
  3. Set up environment variables (see .env.example)
  4. Start the development server:
    yarn run dev

Known Issues & Development Considerations

Content Security Policy

  • The toast notification library (sonner) requires specific style-src hashes in the CSP configuration
  • These hashes are defined in nginx/nginx.conf
  • Updates to sonner may require updating these hashes
  • Reference: sonner#449

Development Environment

  • Ensure Redis is running locally when developing the server
  • The web client expects the API to be available at http://localhost:4321 by default
  • CSP headers in development may differ from production configuration

Security Considerations

  • Always test encryption/decryption flows thoroughly when making changes
  • Ensure no sensitive data is logged or exposed in error messages
  • Maintain strict CSP headers to prevent XSS vulnerabilities
  • Keep dependencies updated for security patches

Contributing

Contributions are welcome! Please feel free to submit an Issue or Pull Request on GitHub.

About

Ephemeral, zero-knowledge secret sharing with end-to-end encryption and seamless UX—no sign-up, just secure and instant sharing.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published