Skip to main content

Python tool/library designed to secure environment variables by encrypting them both in disk and memory.

Project description

envrypt logo

Envrypt

Envrypt is a Python tool/library designed to secure environment variables by encrypting them both in disk and memory. It works with dotenv and provides a simple interface to access encrypted environment variables in your program.

This tool safeguards your application’s environmental variables by concealing them using simple encryption. This can be crucial in environments where telemetry tools or logging mechanisms might accidentally capture and expose sensitive environmental variables, preventing unintended data leaks. There is no guarantee that your library dependency will not accidentally log your environment variables, so it is best to encrypt them.

This tool can provide a layer of protection which actively deters the accidental disclosure of environmental variables, which could occur due to:

  • Logging tools that inadvertently output environment variables.
  • Telemetry or monitoring systems that may include environment details in their reports.
  • Error handling frameworks which collect debugging information, potentially capturing the state of the environment.

By keeping these variables encrypted in memory, envrypt significantly reduces the risk of sensitive information being exposed through such vectors.

Envrypt uses a simple XOR encryption mechanism. While XOR is relatively basic and not recommended for high-security requirements, it can be sufficient for obfuscating environment variables in scenarios where the threat model allows for it. Note that the XOR encryption strength highly depends on the length and randomness of the key. Due to the simplicity of the algorithm, it is important to maintain the secrecy of the encryption key for the encryption to remain effective.

Installation

To install envrypt, use pip:

pip install envrypt

Usage

Step 1: Create .env.raw file

Create a file named .env.raw. This file should contain the real, unencrypted values of your environment variables. Example:

MY_SECRET_KEY=123456
ETHEREUM_PRIVATE_KEY=d3514e92efab55576e3ca338795428fabb8ce14a01e5fe2140619e5b0b30c8ae
ENVRIPT_SECRET_TEXT="Secret text"

REGULAR_VAR=12345
BASE_URL=https://example.com/

Step 2: Compile .env.raw file

Compile the .env.raw file using python -m envrypt.encrypt command. This command will encrypt the variable values with a key where the name ends with _KEY or begins with ENVRIPT_:

python -m envrypt.encrypt > .env

Example output:

SECRET_KEY=XEtAUVZE

# encrypted
ETHEREUM_PRIVATE_KEY=CUpGVFcXXEYOAxgPTEZQVEQARwgESl5BRFxWRldMDQQbD0EQAFJGBERaAEwLHEFUV0JTRVIATA9JEVZTEV0VDg==

# encrypted
ENVRIPT_NEXTJS_VAR=PhwQFwYGRQAOHQ0=

REGULAR_VAR=12345
BASE_URL=https://example.com/

Step 3: Load encrypted variables in your program

In your Python program, you can load the encrypted variables using dotenv as usual, and read it using envrypt.

Example:

import dotenv
from envrypt import env

# load the `.env` file using `dotenv.load_dotenv()`:
dotenv.load_dotenv()

# Finally, you can access the encrypted variables using the `env.get()` method:
env.get("MY_SECRET_KEY")

The env.get() method will automatically decrypt the variable during runtime, ensuring that the variables are secure in memory and only decrypted when needed.

Note: Make sure to keep the .env.raw and .env files secure and do not commit them to version control systems.

When the application starts, it will prompt the user to input the encryption key in the terminal:

$ python hello.py
For dev convenience, you can create a .envrypt file with a single line containing the encryption key.
Enter encryption key:

You should only need to input the encryption key once, and the key will remain in memory for the duration of the application’s runtime.

For development convenience or scenarios where you don’t want the interactive terminal interruption, you can store the encryption key on disk: Create a .envrypt file in the same directory as your .env files:

# .envrypt
TheEncryptionKeyYouWantToUse

Note: Storing encryption keys on disk presents inherent risks and should be managed carefully, particularly in production environments.

Contributing

If you encounter any issues or have suggestions for improvements, feel free to open an issue or submit a pull request on our GitHub repository.

License

This project is licensed under the MIT License.

[] Robin Syihab (@anvie)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

envrypt-0.0.5.tar.gz (5.8 kB view details)

Uploaded Source

File details

Details for the file envrypt-0.0.5.tar.gz.

File metadata

  • Download URL: envrypt-0.0.5.tar.gz
  • Upload date:
  • Size: 5.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.13

File hashes

Hashes for envrypt-0.0.5.tar.gz
Algorithm Hash digest
SHA256 cb12160983db1fdbd4798bceb1042c913b9f2d769f7c2a086ec2dd44f3be3bec
MD5 865ce83f76f702e930d70337507bc421
BLAKE2b-256 c23825bbc5fbfa0c97c71feefab6f487220099a38beb25af22e46224fc9c9123

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page