Secrets, built for the agent era.
A local-first password manager with a native Model Context Protocol surface. Your AI agents get exactly the secrets they need — nothing more, nothing cloud.
The problem
Your password manager wasn't built for agents.
Your AI assistant needs a Stripe key to write a script. You paste it into the prompt. It's now in the model provider's logs, context caches, and who-knows-where else.
Cloud password managers won't expose a secure API to local agents. Even if they did, there's no per-agent scoping — one compromised agent is game over.
Self-hosted vaults exist, but none speak MCP. You're left gluing shell scripts to op get and hoping the agent reads the output correctly.
Audit: your PW manager tells you "an app accessed this item." Which app? Which agent? Which script? Unknown.
Architecture
Local daemon. Agent-scoped access.
01
MCP-native
Expose secrets to Claude Code, Cursor, any MCP client. Per-agent grants: read, reveal_secret, write, delete × glob scope.
One grant flips the agent to deny-by-default
02
KEK/DEK architecture
Password derives the KEK. DEK is random, only rotated via fnox reset. XChaCha20-Poly1305 on items and DEK wrap. SQLCipher at rest.
Crypto decisions documented in ADRs
03
Hash-chained audit
Every read, write, reveal is appended to a hash chain. Tamper with a log entry and fnox audit-verify catches it. Immutable for real.
Audit log you can actually defend in court
04
Zero-cloud sync
Optional TLS + bearer-auth relay lets your devices sync without trusting a vendor. Run the relay on your own VPS or skip sync entirely.
Your secrets never leave hardware you control
Quickstart
Running in 90 seconds.
cargo build --release --workspace
sudo install -m 0755 target/release/fnox /usr/local/bin/fnox
sudo install -m 0755 target/release/fnox-daemon /usr/local/bin/fnox-daemon
fnox install-service
fnox init # prints a 24-word recovery mnemonic ONCE
fnox unlock
fnox add --title "Stripe Live" --vault "Apex Radius" --category login
fnox get "Stripe" # now available to every authorized agent Security features
Built on principles, not marketing.
SQLCipher at rest
PRAGMA key HKDF-derived from the DEK
XChaCha20-Poly1305
Length-prefixed AAD everywhere
MFA second factor
TOTP + single-use backup codes
Signed releases
Ed25519 manifest verified before download
Per-agent ACLs
Glob-scoped, deny-by-default on first grant
Atomic commits
Crash-safe DB + sidecar two-file writes
Import/export
JSON, CSV, 1Password, Bitwarden
CLI + MCP + desktop
Three surfaces, one vault
DR runbook
Documented full-host recovery drill
Download
FortNox 0.1.0
Pre-release builds. The macOS DMG is now signed by Apex Radius and notarized by Apple. Windows is signed-pending until v0.2.
macOS
Apple Silicon
arm64 · M1, M2, M3, M4
DMG containing fnox, fnox-daemon, and an install.sh that drops them into /usr/local/bin.
Windows
x86_64
Windows 10 & 11 · 64-bit
ZIP with fnox.exe (CLI). Extract anywhere, add to PATH, run fnox init. Direct vault commands work standalone — daemon mode (persistent unlock, MCP) lands in 0.2.
Take it.
Free forever for individuals. Self-hosted team relay. Paid support + hardened builds for companies that need it.