ENV Encrypt — share .env files safely with a passphrase
Need to send an .env to a teammate but don't have a proper secret manager set up? This tool encrypts the file with AES-256-GCM using a passphrase you choose. The encryption happens in your browser via the WebCrypto API — the passphrase, ciphertext, and plaintext never leave your machine.
How it works
- You paste a
.envand type a passphrase. - Browser derives a 256-bit key from the passphrase using PBKDF2 with 210,000 iterations (OWASP 2024 recommendation for SHA-256).
- A random 16-byte salt and 12-byte IV are generated per encryption. The same input produces different ciphertext each time.
- AES-GCM encrypts and authenticates the content. Tampering is detectable — a modified ciphertext fails to decrypt rather than returning corrupted data.
- Output format:
ENVTOOLS:v1:{base64url(salt + iv + ciphertext)}
Important — this is not a secret manager
This tool is for transport-layer secrecy — sending a file through an untrusted channel once. For persistent, multi-team secret management, use Doppler, Infisical, or AWS Secrets Manager. They rotate, audit, and scope access in ways a passphrase never will.