Zero-knowledge by construction
BitterPass never sees your plaintext. The server stores ciphertext, key wraps, and verifiers. A full server compromise leaks who-asked-for-what-when, not the secrets themselves.
00 / Sealed by you. Served to your agents.
BitterPass is a zero-knowledge credential service for humans and the agents they trust. You hold the master secret. The server holds ciphertext. Every read is signed, scoped, and audited.
Built for fleets that can no longer treat secrets as environment variables.
01 / Why BitterPass exists
BitterPass is that shape.
BitterPass never sees your plaintext. The server stores ciphertext, key wraps, and verifiers. A full server compromise leaks who-asked-for-what-when, not the secrets themselves.
A passkey opens the human console. An Ed25519 runner identity opens the agent surface. One vault, two trust paths, no shared bearer token sitting in CI.
Every read, write, and rotation lands in an append-only audit chain — locally first, mirrored to the service second. You can replay exactly what an agent saw, and when.
02 / How the trust works
The plaintext lives only between your master secret and the agent run that needs it. Everything in between is ciphertext, signatures, and audit.
01
Generated once, derived through Argon2id, never transmitted. The vault unwraps locally; the service only ever sees ciphertext.
02
Records arrive as XChaCha20-Poly1305 envelopes with attached audit events. Two-phase atomic mirror writes mean no half-committed state — the server either has the whole record or none of it.
03
A runner authenticates with its Ed25519 key, the service hands it a single sealed credential bundle for the run. Bundle expires with the run. Nothing lingers in env or shell history.
03 / What's inside
The primitives are ones you already trust. The shape around them is where BitterPass earns its keep.
04 / Who it's for
Solo builder
Stop pasting API keys into yet another shell rc. Seal them once, hand each agent run only the credentials it actually needs.
Small team
Each member opens the vault with their own passkey. Each runner gets its own Ed25519 identity. Rotate without coordinating six humans.
AI ops engineer
Per-run sealed bundles, append-only audit chain, and idempotent two-phase writes are the substrate you wished CI/CD had ten years ago.
05 / Access
BitterPass is invitation-only while it hardens. Tell us what you want to seal and which fleet you want to seal it for.
Approvals are manual. Replies come from a human, not a queue.