Chrome Extension · MV3 · AES-256

The Skill & Secrets Vault
Built for AI Developers

A Chrome sidepanel that keeps your AI workflow organised: a library for skill prompts and an encrypted vault for every API key, token, and credential you manage. Everything stays on your device.

Free forever · No account required · All data stays local
📚 Skills Library
AgentVault
📚 Skills
🔐 Vault
Python Code Review
GitHub
Senior engineer review: bugs, perf, style
⧉ Inject into prompt
SEO Blog Writer
Upload
Long-form SEO content with keyword strategy
⧉ Inject into prompt
Railway Deploy Helper
Paste
Step-by-step Railway deployment workflow
⧉ Inject into prompt
Import from GitHub, upload a file, or paste. One click copies the skill into your AI chat.
🔐 Secrets Vault
AgentVault
📚 Skills
🔐 Vault
3 secrets
🔒
🤖
RESEND_API_KEY
API Key
re_••••••••••••••••5f8c
⧉ Copy value
OPENAI_API_KEY
API Key
sk-••••••••••••••••a2d1
⧉ Copy value
🤖 Agent Session Active
14:32
a3f9c2b1e04d7a88…5c29d1
AES-256 encrypted. Copy values when setting up Railway, Vercel, or any deployment platform — or grant your local AI agent timed access.

Two tools, one sidepanel

AgentVault covers the full AI developer workflow — from building prompts to deploying integrations to running local agents.

📚

Skills Library

A SKILLS.md file is a structured markdown document that gives an AI model a specific capability — a coding persona, a writing style, a step-by-step workflow, or a set of instructions for a tool or framework. AgentVault stores your collection and injects any skill into your AI chat with one click.

Import from a GitHub URL (pull from the community or your own repos), upload files in bulk from your machine, or paste markdown directly. Skills are tagged by source so you always know where they came from.

🔐

AES-256 Secrets Vault

Store every API key, token, webhook secret, and password in one place — encrypted with AES-256-GCM and a master password you set. The vault never leaves your device and we have no way to access it.

When you're setting up a new integration on Railway, Vercel, Supabase, or any deployment platform, copy the value in one click — decrypted in-memory, never written to disk.

🤖

Grant Agent Session

Running an AI agent locally? Click 🤖 to generate a 15-minute token. Your agent requests secrets by name via Chrome's messaging API — no environment variable juggling, no hardcoding, no leaking keys in chat. The session auto-revokes when time is up.

Pro Feature
🔒

Local-Only Storage

All data lives in chrome.storage.local. Nothing is transmitted to any server — ever. Your vault, your skills, your keys: fully private, fully offline-capable.

One-Click Deploy Prep

Stop hunting across browser tabs and password managers when you're wiring up a new service. Every key is one click away — copy it directly into Railway variables, a .env file, or a terminal export. Decrypted in-memory only, never written to disk.

🛡️

Auto-Revoke Sessions

Agent sessions expire automatically after 15 minutes. Revoke manually any time with one click. Session secrets live in chrome.storage.session — cleared the moment your browser closes.

Up and running in minutes

1

Install & Set Up

Install from the Chrome Web Store. Set a master password to initialise your encrypted vault — it never leaves your machine.

2

Build Your Skill Library

Import SKILLS.md files from GitHub, upload from disk, or paste markdown. Inject any skill into your AI chat with one click.

3

Store Your Secrets

Add API keys, tokens, and passwords. Copy any value when deploying to Railway, Vercel, or Supabase — decrypted in-memory, never exposed.

4

Grant Agent Access

Running a local AI agent? Hit 🤖, pass the token to your agent, and let it pull secrets by name. Auto-revokes after 15 minutes.

Your agent asks.
AgentVault answers.

When you're running AI agents locally — in Cursor, Claude Desktop, or a custom script — they need credentials without you having to paste them into a prompt or bake them into config files. Agent Session makes that clean.

1

You grant a session

Click 🤖 in the vault. A 15-minute session token is generated and displayed.

2

Agent receives the token

Pass it at agent startup — via terminal argument, environment variable, or startup prompt.

3

Agent requests secrets by name

One sendMessage call returns the plaintext value. Expired or revoked? Returns an error immediately.

Agent code — request a secret at runtime
// "Wire my email service. Use the Resend key in AgentVault."

const getSecret = (token, name) =>
  new Promise((resolve, reject) => {
    chrome.runtime.sendMessage(
      AGENTVAULT_EXT_ID,
      { type: 'av_getSecret', token, name },
      (res) => res?.success
        ? resolve(res.value)
        : reject(res?.error)
    );
  });

// Fetch the key, wire up Resend — no paste, no hardcode
const apiKey = await getSecret(token, 'RESEND_API_KEY');
const resend = new Resend(apiKey);
✓ Token expires in 15 min  ·  ✓ Localhost only  ·  ✓ Revoke any time

Simple, honest pricing

Start free. Upgrade when you need unlimited skills, unlimited secrets, and Agent Session access.

Free
$0
Forever free
  • 5 skills (GitHub, upload, paste)
  • 5 encrypted secrets
  • AES-256 vault encryption
  • One-click deploy prep
  • Grant Agent Session
  • Unlimited skills
  • Unlimited secrets
Install Free
Pro
$5/month
or $39/year — save 35%
  • Unlimited skills
  • Unlimited secrets
  • AES-256 vault encryption
  • One-click deploy prep
  • 🤖 Grant Agent Session
  • Priority support
  • All future Pro features
Upgrade to Pro →

No subscription required for free tier  ·  Cancel anytime  ·  Payments via Paddle (global VAT/GST handled)

🔐

Your skills and secrets,
always within reach

Install AgentVault free. Your prompts, your keys, and your agents — organised, encrypted, and local.