Encryption & Security
Shield uses industry-standard cryptography to protect your secrets.Encryption Algorithm
AES-256-GCM (Galois/Counter Mode)- 256-bit key length
- Authenticated encryption
- Prevents tampering
Key Derivation
Argon2id — Winner of the Password Hashing Competition Parameters:- Memory: 64 MB
- Iterations: 3
- Parallelism: 4
How It Works
File Security
| File | Contains | Commit? |
|---|---|---|
.dotset/key | Random bytes | Never |
.dotset/manifest.json | Encrypted blobs | Yes |
Zero-Knowledge Architecture
- Local encryption only — We never see your plaintext secrets
- Client-side keys — Your key never leaves your machine
- Encrypted sync — Cloud stores only encrypted blobs
Cloud Security
When using cloud sync:- TLS 1.3 in transit
- AES-256 at rest
- SOC 2 Type II infrastructure
- Regular security audits
Threat Model
Shield protects against:| Threat | Protection |
|---|---|
| Log exposure | Real-time redaction |
| Manifest theft | AES-256 encryption |
| Brute force | Argon2id key derivation |
| Tampering | GCM authentication |
Key Rotation
To rotate your encryption key for the native provider:Other Providers
Secrets pulled from external providers like AWS Secrets Manager, Environment Variables, or .env files are:- Never stored in plaintext by Shield.
- Processed in-memory only during the execution of
dotset run. - Automatically tracked by the redaction engine.