multiAI Summary Pending
mema-vault
Secure credential manager using AES-256 (Fernet) encryption. Stores, retrieves, and rotates secrets using a mandatory Master Key. Use for managing API keys, database credentials, and other sensitive tokens.
3,556 stars
byopenclaw
Installation
Claude Code / Cursor / Codex
$curl -o ~/.claude/skills/mema-vault/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/1999azzar/mema-vault/SKILL.md"
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/mema-vault/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How mema-vault Compares
| Feature / Agent | mema-vault | Standard Approach |
|---|---|---|
| Platform Support | multi | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Secure credential manager using AES-256 (Fernet) encryption. Stores, retrieves, and rotates secrets using a mandatory Master Key. Use for managing API keys, database credentials, and other sensitive tokens.
Which AI agents support this skill?
This skill is compatible with multi.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Mema Vault ## Prerequisites - **Master Key**: Must be set as an environment variable `MEMA_VAULT_MASTER_KEY`. - **Dependencies**: Requires `cryptography` Python package. ## Core Workflows ### 1. Store a Secret Encrypt and save a new credential. - **Usage**: `python3 $WORKSPACE/skills/mema-vault/scripts/vault.py set <service> <user> <password> [--meta "info"]` ### 2. Retrieve a Secret Fetch a credential. By default, the password is masked in output. - **Usage**: `python3 $WORKSPACE/skills/mema-vault/scripts/vault.py get <service>` - **Show Raw**: Use `--show` flag only when required for secure injection. ### 3. List Credentials - **Usage**: `python3 $WORKSPACE/skills/mema-vault/scripts/vault.py list` ## Security Standards - **Encryption**: AES-256 CBC via PBKDF2HMAC (480,000 iterations). - **Masking**: Secrets are masked in standard logs/output unless explicitly requested. - **Isolation**: The Master Key should never be stored in plaintext on disk.