Pricing

Start for free, then harden your keys.

Free

$0 / mo

.env.keys

Local on device

  • Run Anywhere
  • Multi-Environment
  • Encrypted .env Files
  • Self-Managed
  • Local Private Keys

Ops Solo

$2.99 / mo

50 Private Keys

Armored Off Device ⛨

  • Run Anywhere
  • Multi-Environment
  • Encrypted .env Files
  • Fully Managed
  • Armored Private Keys ⛨
  • Rotations
  • Personal Security
  • Personal Access

Ops Team

$20 / mo

100 Private Keys

Armored Off Device ⛨

  • Run Anywhere
  • Multi-Environment
  • Encrypted .env Files
  • Fully Managed
  • Armored Private Keys ⛨
  • Rotations
  • Team Security
  • Access Approvals
  • Access Controls
  • Access Logs
  • Access Alerts

Ops Secure

$90 / mo

1,000 Private Keys

Armored Off Device ⛨

  • Run Anywhere
  • Multi-Environment
  • Encrypted .env Files
  • Fully Managed
  • Armored Private Keys ⛨
  • Rotations
  • Team Security
  • Access Approvals
  • Access Controls
  • Access Logs
  • Access Alerts

coming soon

Need a custom enterprise plan? Contact us

Access & Identity

Feature Free Solo Team Secure Enterprise
Login with GitHub
Automation Tokens
Rotations Daily Limit 10 Unlimited Unlimited Unlimited
Team Members 1 3 10 Flexible
Log Retention 30 days 30 days 30 days 30 days Flexible

Customer Support

Feature Free Solo Team Secure Enterprise
Ticket Support
Slack Support
.env Expertise
Urgent Response SLA
Priority Security Updates
In-App Documentation
TRUSTED BY DEVELOPERS

426 developers signed up last month.

FAQ

Dotenvx uses Elliptic Curve Integrated Encryption Scheme (ECIES) to encrypt each secret with a unique ephemeral key, while ensuring it can be decrypted using a long-term private key.

When you initialize encryption, a DOTENV_PUBLIC_KEY (encryption key) and DOTENV_PRIVATE_KEY (decryption key) are generated. The DOTENV_PUBLIC_KEY is used to encrypt secrets, and the DOTENV_PRIVATE_KEY is securely stored in your cloud secrets manager or .env.keys file.

Your encrypted .env file is then safely committed to code. Even if the file is exposed, secrets remain protected since decryption requires the separate DOTENV_PRIVATE_KEY, which is never stored alongside it. Read the whitepaper for more details.

Yes. Dotenvx encrypts secrets using AES-256 with ephemeral keys, ensuring that even if the encrypted .env file is exposed, its contents remain secure. The encryption keys themselves are protected using Secp256k1 elliptic curve cryptography, which is widely used for secure key exchange in technologies like Bitcoin.

This means that every secret in the .env file is encrypted with a unique AES-256 key, and that key is further encrypted using a public key (Secp256k1). Even if an attacker obtains the encrypted .env file, they would still need the corresponding private key—stored separately—to decrypt anything.

Breaking this encryption would require brute-forcing both AES-256 and elliptic curve cryptography, which is computationally infeasible with current technology. Read the whitepaper for more details.

In the Vercel incident scenario, if an attacker accesses environment variables, they still cannot decrypt your encrypted .env secrets without the separate private decryption key. To steal your secrets, an attacker needs both the private key and the encrypted .env files.

dotenvx logo

Armor up.
Today.