Centilio Vault is zero-knowledge by architecture, not by marketing. If our database is stolen, the attacker walks away with ciphertexts and a schema. Your secrets stay yours.
Stays in the user's browser memory. Never sent across the wire. Never written to disk.
Memory-hard key derivation (m=64 MB, t=3, p=4) turns the master password into a Master Key. GPU- and ASIC-resistant.
HKDF-SHA256 with org salt + info-tag derives a Key-Encryption-Key, also client-only.
Each item gets a random 256-bit DEK. Items are AES-GCM-encrypted with the DEK; the DEK is wrapped under the KEK.
Server receives ciphertext + wrapped DEK. Steals nothing useful if breached.
Full diagram in docs/architecture/crypto-zero-knowledge.md.
From our public threat model. No hand-waving.
| Asset | Where it lives | What protects it |
|---|---|---|
| Master password | Client RAM only | Never sent; KDF transformation |
| Per-item DEKs | Client RAM (transient) | Wrapped under KEK before persisting |
| Wrapped DEKs at rest | Postgres ciphers table | KEK is client-only; server can't unwrap |
| Login proofs | BCrypt-hashed in DB | BCrypt + login rate-limit |
| JWT signing secret | Server env var | Not in repo; rotation playbook |
| Audit log | Append-only DB table | Service-role-only writes; hash-chain target |
We publish what's open as well as what's closed. Vague claims help nobody. Full ledger in docs/security/findings-log.md.
PBKDF2-100k → Argon2id KDF
Migration in flight. Argon2id is the target; PBKDF2 is current. Rotation runbook exists.
TOTP secrets unencrypted at rest
Tracked. Encrypting under user KEK in next quarter.
Criteria value-injection SQLi (R&D)
Identified, fix queued. Not user-reachable today.
No JUnit harness, near-zero unit tests
Test scaffold landing this quarter. Smoke tests in CI today.
No external pen test on record
Vendor-gated. Engaging Q3 for first formal pen test.
We respond to security reports within 48 hours and credit discoverers in our public CHANGELOG.
Vault is MIT-licensed. Read the code, run the build, audit it yourself.
View on GitHub →Send us your standard vendor questionnaire. We answer it, share our threat model, and walk your team through the architecture. Honest answers, in writing.
Or email us directly at [email protected]