Conversation
Co-authored-by: 403-html <57900160+403-html@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] Add command-line tool for managing encrypted project secrets
feat: implement nillsec encrypted secrets vault CLI
Mar 16, 2026
Co-authored-by: 403-html <57900160+403-html@users.noreply.github.com>
Copilot
AI
changed the title
feat: implement nillsec encrypted secrets vault CLI
Add multi-arch release workflow with SHA-256 verification
Mar 16, 2026
Contributor
There was a problem hiding this comment.
Pull request overview
This PR introduces the nillsec Go CLI and its encrypted vault implementation, and adds a GitHub Actions workflow to build and publish multi-arch release binaries with SHA-256 checksums.
Changes:
- Add
vaultpackage implementing Argon2id + AES-256-GCM encrypted secret storage and persistence. - Add
nillsecCLI commands (init/add/set/get/list/remove/edit/env/version) and update docs/gitignore accordingly. - Add multi-arch release workflow that cross-compiles on tag pushes and publishes a GitHub Release with checksums.
Reviewed changes
Copilot reviewed 6 out of 9 changed files in this pull request and generated 10 comments.
Show a summary per file
| File | Description |
|---|---|
.github/workflows/release.yml |
Builds/test/releases tagged versions across multiple GOOS/GOARCH targets and publishes release assets + checksums. |
main.go |
Implements CLI commands, password prompting, edit flow, and env export. |
vault/vault.go |
Adds encrypted vault format, KDF/encryption, and vault CRUD helpers. |
vault/vault_test.go |
Adds tests for init/load/save, CRUD, marshaling, and ciphertext variability. |
README.md |
Documents features, vault format, usage, and environment variables. |
.gitignore |
Ignores build outputs and Go test cache. |
go.mod / go.sum |
Adds module metadata and dependencies (x/crypto, x/term). |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Copilot
AI
changed the title
Add multi-arch release workflow with SHA-256 verification
Add release workflow, icon embedding, and local build script
Mar 16, 2026
4afae57 to
4acf64a
Compare
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
Co-authored-by: 403-html <57900160+403-html@users.noreply.github.com>
Copilot
AI
changed the title
Add release workflow, icon embedding, and local build script
Add multi-arch release workflow, nillsec CLI, and encrypted vault
Mar 16, 2026
…ngs, os.Remove error Co-authored-by: 403-html <57900160+403-html@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Introduces the
nillsecencrypted secret vault CLI, its supportingvaultpackage, a multi-arch GitHub Actions release workflow, and security hardening based on code review feedback.vaultpackage (vault/vault.go)Init,Load,Save) accepts[]bytefor passwords, enabling proper in-memory wiping viawipeByteswith no leftover string copiesparseVaultFilevalidates salt length (16 bytes) and nonce length (12 bytes) after base64 decode, returning a clean error instead of panicking incipher.NewGCMparseVaultFilehandles CRLF line endings (Windows / editor round-trips) by stripping\rfrom each line before header comparison and field parsingKeys()usessort.Stringsfrom the standard library instead of a custom O(n²) helperCLI (
main.go)init,add,set,get,list,remove,edit,env,versionNILLSEC_VAULTenv var overrides the defaultsecrets.vaultpath;NILLSEC_PASSWORDallows non-interactive usepromptPasswordandpromptPasswordConfirmreturn[]bytedirectly —term.ReadPasswordalready returns[]byte, so the TTY path has zero unnecessary copies; secrets are zeroed viadefer wipeBytes(pw)at every call sitewipeStringremoved; password handling uses[]bytethroughout^[A-Za-z_][A-Za-z0-9_]*$) atadd/settime, preventing shell-unsafe names from being stored and makingeval "$(nillsec env)"safe by constructioncmdEditchecks theos.Removeerror on the plaintext temp file; on failure it truncates the file to eliminate plaintext before returning an error, ensuring the vault write is skipped while plaintext remains on diskRelease workflow (
.github/workflows/release.yml)v*tags; gates all builds behindgo test ./...linux/{amd64,arm64,armv7},darwin/{amd64,arm64},windows/{amd64,arm64}-X main.version=<tag>checksums.txt(SHA-256)Tests (
vault/vault_test.go)vault.Loadandos.ReadFileare explicitly checked witht.Fatalffor clear failure attributionruntime.GOOS != "windows"for cross-platform portability✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.