multiAI Summary Pending
tauri-app-stronghold
Store secrets and sensitive data in encrypted vaults using the Tauri v2 stronghold plugin with snapshot management. Use when securing API keys, tokens, or credentials on disk, managing encrypted snapshots, or pairing with biometric authentication.
223 stars
Installation
Claude Code / Cursor / Codex
$curl -o ~/.claude/skills/tauri-app-stronghold/SKILL.md --create-dirs "https://raw.githubusercontent.com/partme-ai/full-stack-skills/main/skills/tauri-skills/tauri-app-stronghold/SKILL.md"
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/tauri-app-stronghold/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How tauri-app-stronghold Compares
| Feature / Agent | tauri-app-stronghold | Standard Approach |
|---|---|---|
| Platform Support | multi | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Store secrets and sensitive data in encrypted vaults using the Tauri v2 stronghold plugin with snapshot management. Use when securing API keys, tokens, or credentials on disk, managing encrypted snapshots, or pairing with biometric authentication.
Which AI agents support this skill?
This skill is compatible with multi.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
## When to use this skill
**ALWAYS use this skill when the user mentions:**
- Encrypted storage for secrets, credentials, or API keys
- Stronghold snapshots or vault management
- Securing sensitive data on disk
**Trigger phrases include:**
- "stronghold", "encrypted storage", "secrets", "vault", "secure storage", "credentials"
## How to use this skill
1. **Install the stronghold plugin**:
```bash
cargo add tauri-plugin-stronghold
```
2. **Register the plugin** in your Tauri builder:
```rust
tauri::Builder::default()
.plugin(tauri_plugin_stronghold::Builder::new(|password| {
// Hash the password for vault encryption
argon2::hash_raw(password.as_bytes(), b"salt", &argon2::Config::default()).unwrap()
}).build())
```
3. **Configure capabilities** in `src-tauri/capabilities/default.json`:
```json
{ "permissions": ["stronghold:default"] }
```
4. **Store and retrieve secrets from the frontend**:
```typescript
import { Stronghold } from '@tauri-apps/plugin-stronghold';
const stronghold = await Stronghold.load('vault.hold', 'user-password');
const client = await stronghold.loadClient('main');
const store = client.getStore();
await store.insert('api-key', Array.from(new TextEncoder().encode('sk-12345')));
const value = await store.get('api-key');
```
5. **Save snapshots** to persist the encrypted vault to disk
6. **Pair with biometric plugin** to unlock the vault using TouchID/FaceID instead of a password
## Outputs
- Stronghold plugin setup with encrypted vault
- Secret storage and retrieval pattern
- Snapshot persistence and biometric unlock integration
## References
- https://v2.tauri.app/plugin/stronghold/
## Keywords
tauri stronghold, encrypted storage, secrets, vault, credentials, secure storage