PassStore app icon

PassStore

by Makio

Developer secrets that never leave your Mac

Native macOS app for API keys, .env groups, and server credentials—open source (MIT). Everything stays on your Mac, secured with Keychain and encryption.

Full source, tests, and Xcode project on GitHub — verify and build it yourself.

PassStore

Built for how you actually work

Workspaces, environments, and quick copy—built for daily dev work, with nothing synced to the cloud.

Local-first vault

API keys, database credentials, and .env groups stay on your Mac. No cloud sync, no telemetry, no vendor lock-in — sensitive values in Keychain, not plain text in the database, plus encryption at rest.

  • Keychain-ready
  • AES-256-GCM at rest
  • You own the data
Network activity0 kb/s

Nothing phones home while you work — exports are explicit, under your control.

Native macOS app

Swift and SwiftUI: fast lists, native text fields, and behaviors that feel like real Mac software — not a wrapped web view.

Secrets in Keychain

Sensitive values can live in the Apple Keychain instead of plain-text stores, with the OS handling access and optional biometric gates. Full overview.

Keyboard-first

Command palette, search, and shortcuts so you can jump to a secret, copy a field, and get back to the terminal without reaching for the mouse.

Workspaces and environments

Group items by client or project, tag environments (local, staging, production), and keep exports scoped to the workspace you are in.

Industry - Standard Encryption

PassStore integrates directly with the macOS Keychain Services API. We leverage the hardware-backed security of your Mac's Secure Enclave to keep your keys untouchable.

AES-256-GCM

Authenticated encryption for data at rest.

Argon2id

Memory-hard key derivation. Resistant to GPU and ASIC brute-force.

Apple Keychain

Vault key stored with biometric access control, device-only.

Clipboard guard

Secrets auto-clear after 10 s and are excluded from Handoff.

Read the full security overview →

/// Secure Enclave Access
let query: [String: Any] = [
kSecClass: kSecClassGenericPassword,
kSecAttrAccount: "api_key_prod",
kSecAttrAccessControl: accessControl,
kSecUseAuthenticationUI: kSecUseAuthenticationUIAllow
]
/// Decrypt with Hardware Key
SecItemCopyMatching(query as CFDictionary, &result)

Ready to secure your stack?

Free for macOS — no subscription. The app is open source on GitHub (MIT); the repository holds the full source, tests, and docs such as SECURITY.md. Read the security overview on this site for how PassStore protects your vault. Optional support on Ko-fi if you want to buy the developer a coffee.

REQUIREMENTS: macOS 26.0 OR LATER · UNIVERSAL BINARY

Frequently asked questions