Password manager using steganography to embed encrypted credentials in images
Project description
StegVault
Secure password manager using steganography to embed encrypted credentials within images
StegVault is a full-featured password manager that combines modern cryptography with steganography. It can store either a single password or an entire vault of credentials, all encrypted using battle-tested algorithms (XChaCha20-Poly1305 + Argon2id) and hidden within ordinary PNG or JPEG images.
Latest Release (v0.7.4): Favorite Folders feature for TUI - Quick access to frequently used vault locations with cross-platform filesystem support!
Features
Core Features
- ๐ Strong Encryption: XChaCha20-Poly1305 AEAD with Argon2id KDF
- ๐ผ๏ธ Dual Steganography: PNG LSB + JPEG DCT coefficient modification
- ๐ฏ Auto-Detection: Automatically detects image format (PNG/JPEG)
- ๐ Zero-Knowledge: All operations performed locally, no cloud dependencies
- โ Authenticated: AEAD tag ensures data integrity
- ๐งช Well-Tested: 778 unit tests with 89% overall coverage (all passing)
- โฑ๏ธ User-Friendly: Progress indicators for long operations
Vault Mode
- ๐๏ธ Multiple Passwords: Store entire password vault in one image
- ๐ฏ Key-Based Access: Retrieve specific passwords by key (e.g., "gmail", "github")
- ๐ Password Generator: Cryptographically secure password generation
- ๐ Rich Metadata: Username, URL, notes, tags, timestamps for each entry
- ๐ Password History: Track password changes with timestamps and reasons (v0.7.1)
- ๐ Dual-Mode: Choose single password OR vault mode
- โป๏ธ Auto-Detection: Automatically detects format on restore (backward compatible)
- ๐ค Import/Export: Backup and restore vaults via JSON
- ๐ Clipboard Support: Copy passwords to clipboard with auto-clear
- ๐ TOTP/2FA: Built-in authenticator with QR code support
- ๐ก๏ธ Password Strength: Realistic validation using zxcvbn with actionable feedback
- ๐ Search & Filter: Find entries by query or filter by tags/URL
Gallery Mode (v0.5.0)
- ๐ผ๏ธ Multi-Vault Management: Organize multiple vault images in one gallery
- ๐๏ธ SQLite Metadata: Centralized database for vault information and entry cache
- ๐ Cross-Vault Search: Search across all vaults simultaneously
- ๐ท๏ธ Tagging System: Organize vaults with custom tags
- โก Fast Search: Cached entry metadata for instant results
- ๐ Vault Statistics: Track entry counts, last accessed times
- ๐ Auto-Refresh: Update cache when vault contents change
Headless Mode (v0.6.0)
- ๐ค JSON Output: Machine-readable output for all critical commands
- ๐ Passphrase File: Non-interactive authentication via
--passphrase-file - ๐ Environment Variables:
STEGVAULT_PASSPHRASEfor CI/CD pipelines - ๐ข Exit Codes: Standardized codes (0=success, 1=error, 2=validation)
- โ๏ธ Automation-Ready: Perfect for scripts, backups, and deployments
- ๐ Priority System: Explicit > File > Env > Prompt fallback
Application Layer (v0.6.1)
- ๐๏ธ Clean Architecture: Separation of business logic from UI layers
- ๐ฏ Multi-Interface: Controllers work with CLI, TUI, and future GUI
- ๐ฆ Structured Results: All operations return typed result objects
- ๐งช Easy Testing: No UI framework dependencies in business logic
- ๐ Thread-Safe: Designed for concurrent access in GUI applications
- ๐จ Consistent Logic: Same business rules across all interfaces
Quick Start
Installation
# Install from PyPI (recommended)
pip install stegvault
# Or install from source
git clone https://github.com/kalashnikxvxiii-collab/stegvault.git
cd stegvault
pip install -e .
Usage
StegVault offers three interfaces for managing your passwords:
- Terminal UI (TUI) - Full-featured visual interface in your terminal ๐จ
- Command Line (CLI) - Scriptable commands for automation ๐ค
- Headless Mode - JSON output for CI/CD and scripts ๐
Terminal UI (TUI) - Recommended for Interactive Use
Launch the full-featured terminal interface:
stegvault tui
Features:
- ๐ฅ๏ธ Modern visual interface with keyboard shortcuts
- ๐ File browser for selecting vaults
- ๐ Entry list with live search/filter
- ๐ TOTP codes with auto-refresh countdown
- ๐ฒ Built-in password generator
- ๐ Full CRUD operations (Create, Read, Update, Delete)
- โจ๏ธ Complete keyboard navigation
Keyboard Shortcuts:
o- Open vault |n- New vault |h- View password historya- Add entry |e- Edit |d- Deletec- Copy password |v- Toggle visibilitys- Save changes |/- Search entriesf- Favorite current folder |Ctrl+f- Quick access to favorites
Favorite Folders (v0.7.4):
- Save frequently used vault locations for quick access
- Quick dropdown menu with cross-platform support
- Persistent storage in
~/.stegvault/favorite_folders.jsonwith restrictive permissions (0600) - Automatic cleanup of non-existent paths
- Toggle favorites on/off with a single keypress
Mode 1: Single Password (Simple Backup)
1. Check Image Capacity
stegvault check -i myimage.png
2. Create Backup
stegvault backup -i cover.png -o backup.png
3. Restore Password
stegvault restore backup.png
Mode 2: Vault (Multiple Passwords)
Note: All commands work with both PNG and JPEG! Simply use
.jpgextension:stegvault vault create -i cover.jpg -o vault.jpg -k gmail --generate
1. Create Vault with First Entry
stegvault vault create -i cover.png -o vault.png -k gmail --generate
# Automatically generates a secure password for Gmail
# Works with JPEG too: -i cover.jpg -o vault.jpg
2. Add More Passwords
stegvault vault add vault.png -o vault_v2.png -k github -u myusername --generate
stegvault vault add vault_v2.png -o vault_v3.png -k aws
3. Retrieve Specific Password
stegvault vault get vault_v3.png -k gmail
# Output:
# Entry: gmail
# Username: user@gmail.com
# URL: https://gmail.com
# Password: X7k$mP2!qL5@wN
4. List All Keys
stegvault vault list vault_v3.png
# Output:
# Vault contains 3 entries:
# 1. gmail (user@gmail.com)
# 2. github (myusername)
# 3. aws
5. Update Entry
stegvault vault update vault_v3.png -o vault_v4.png -k gmail --password newpass123
6. Export Vault
stegvault vault export vault_v4.png -o backup.json --pretty
7. Import Vault
stegvault vault import backup.json -i cover.png -o restored_vault.png
8. Delete Entry
stegvault vault delete vault_v4.png -o vault_v5.png -k oldservice
9. Copy Password to Clipboard
stegvault vault get vault.png -k gmail --clipboard
# Password copied to clipboard (not displayed on screen)
# Auto-clear clipboard after 30 seconds
stegvault vault get vault.png -k gmail --clipboard --clipboard-timeout 30
10. Setup TOTP/2FA
# Add TOTP secret to entry
stegvault vault add vault.png -o vault_v2.png -k github -u myuser --totp
# Generate TOTP code
stegvault vault totp vault_v2.png -k github
# Output: Current TOTP code for 'github': 123456 (valid for 25 seconds)
# Show QR code for authenticator app
stegvault vault totp vault_v2.png -k github --qr
# Search vault entries
stegvault vault search vault.png --query "github"
# Search specific fields only
stegvault vault search vault.png -q "work" --fields key --fields notes
# Filter entries by tags
stegvault vault filter vault.png --tag work
stegvault vault filter vault.png --tag work --tag email --match-all
# Filter by URL pattern
stegvault vault filter vault.png --url github.com
Password History (v0.7.1)
Track and view password changes over time:
# View password history for an entry
stegvault vault history vault.png gmail
# Output:
# ============================================================
# Password History for: gmail
# ============================================================
# Current password: MyNewSecureP@ss2024
# Modified: 2025-12-03T17:45:23.456789Z
#
# History (2 entries):
# ------------------------------------------------------------
#
# 1. Password: OldPassword123
# Changed at: 2025-12-02T10:30:15.123456Z
# Reason: scheduled rotation
#
# 2. Password: VeryOldPass456
# Changed at: 2025-11-15T08:20:00.000000Z
# ============================================================
# View history with JSON output (for automation)
stegvault vault history vault.png gmail --json
# Output: {"status":"success","data":{"key":"gmail","current_password":"...","history_count":2,...}}
# Clear password history for an entry
stegvault vault history-clear vault.png gmail -o vault_updated.png
# Confirmation: This will clear 2 historical password(s) for 'gmail'.
# Are you sure? [y/N]: y
# Output: Password history cleared for 'gmail'.
# Updated vault saved to: vault_updated.png
# Clear history without confirmation (for scripts)
stegvault vault history-clear vault.png gmail -o vault_updated.png --no-confirm
# Update password with reason for tracking
stegvault vault update vault.png -o vault_v2.png -k gmail \
--password "NewSecurePass123" \
--password-change-reason "suspected breach"
# History automatically tracks: old password + timestamp + reason
TUI Password History (Terminal UI):
- Press
hwith an entry selected to view full password history - See inline preview of last 3 changes in detail panel
- Color-coded display: passwords (yellow), timestamps (gray), reasons (cyan)
Gallery Management (v0.5.0)
Manage multiple vaults in one place:
# Initialize gallery database
stegvault gallery init
# Creates ~/.stegvault/gallery.db
# Add vaults to gallery
stegvault gallery add work_vault.png --name work-vault --tag work
stegvault gallery add personal_vault.png --name personal-vault --tag personal
# List all vaults
stegvault gallery list
# Output:
# 2 vault(s) in gallery:
#
# Name: personal-vault
# Path: /path/to/personal_vault.png
# Entries: 5
# Tags: personal
#
# Name: work-vault
# Path: /path/to/work_vault.png
# Entries: 12
# Tags: work
# Search across ALL vaults
stegvault gallery search "github"
# Output:
# Found 2 matching entries:
#
# [work-vault]
# Key: github-work
# Username: work@company.com
# URL: https://github.com
#
# [personal-vault]
# Key: github-personal
# Username: myusername
# URL: https://github.com
# Search in specific vault only
stegvault gallery search "email" --vault work-vault
# Refresh vault metadata after changes
stegvault gallery refresh work-vault
# Remove vault from gallery (doesn't delete the image)
stegvault gallery remove old-vault
Headless Mode (v0.6.0) - Automation & CI/CD
Automation-friendly features for scripts, CI/CD pipelines, and server environments.
JSON Output
All critical commands support --json for machine-readable output:
# Check image capacity with JSON output
stegvault check -i image.png --json
{
"status": "success",
"data": {
"image_path": "image.png",
"format": "PNG",
"mode": "RGB",
"size": {"width": 800, "height": 600},
"capacity": 18750,
"max_password_size": 18686
}
}
# Retrieve password in JSON format
stegvault vault get vault.png -k gmail --passphrase mypass --json
{
"status": "success",
"data": {
"key": "gmail",
"password": "secret123",
"username": "user@gmail.com",
"url": "https://gmail.com",
"notes": "Personal email",
"has_totp": true
}
}
# List vault entries as JSON
stegvault vault list vault.png --passphrase mypass --json
{
"status": "success",
"data": {
"entries": [
{"key": "gmail", "username": "user@gmail.com", "url": "https://gmail.com", "has_totp": true},
{"key": "github", "username": "myuser", "url": "https://github.com", "has_totp": false}
],
"entry_count": 2
}
}
Passphrase from File
Avoid interactive prompts by providing passphrase via file:
# Store passphrase in a secure file
echo "MySecretPassphrase" > ~/.vault_pass
chmod 600 ~/.vault_pass
# Use --passphrase-file to read from file
stegvault vault get vault.png -k gmail --passphrase-file ~/.vault_pass --json
# Works with all vault commands
stegvault vault list vault.png --passphrase-file ~/.vault_pass
Environment Variable
Set STEGVAULT_PASSPHRASE for completely non-interactive operation:
# Export passphrase as environment variable
export STEGVAULT_PASSPHRASE="MySecretPassphrase"
# No passphrase prompt - automatically uses env var
stegvault vault get vault.png -k gmail --json
stegvault vault list vault.png --json
Passphrase Priority
StegVault uses this priority order for passphrases:
- Explicit
--passphrase(highest priority) --passphrase-fileSTEGVAULT_PASSPHRASEenvironment variable- Interactive prompt (fallback)
# Explicit passphrase overrides file and env var
stegvault vault get vault.png -k gmail --passphrase "explicit" --json
# File overrides env var
stegvault vault get vault.png -k gmail --passphrase-file ~/.pass --json
# Env var used if no explicit or file
export STEGVAULT_PASSPHRASE="fallback"
stegvault vault get vault.png -k gmail --json
Exit Codes
Standardized exit codes for automation:
- 0 = Success
- 1 = Runtime error (wrong passphrase, file not found, decryption error)
- 2 = Validation error (invalid input, empty passphrase file)
# Check exit code in scripts
stegvault vault get vault.png -k gmail --passphrase-file ~/.pass --json
if [ $? -eq 0 ]; then
echo "Success"
elif [ $? -eq 1 ]; then
echo "Runtime error"
elif [ $? -eq 2 ]; then
echo "Validation error"
fi
Example: CI/CD Pipeline
# .github/workflows/deploy.yml
- name: Retrieve database password
run: |
PASSWORD=$(stegvault vault get secrets.png \
-k db_password \
--passphrase-file ${{ secrets.VAULT_PASSPHRASE_FILE }} \
--json | jq -r '.data.password')
echo "::add-mask::$PASSWORD"
echo "DB_PASSWORD=$PASSWORD" >> $GITHUB_ENV
- name: Deploy application
run: ./deploy.sh
env:
DB_PASSWORD: ${{ env.DB_PASSWORD }}
Example: Backup Script
#!/bin/bash
# backup_passwords.sh - Automated password backup
set -e # Exit on error
VAULT_PASS_FILE="$HOME/.vault_pass"
BACKUP_DIR="$HOME/backups"
DATE=$(date +%Y%m%d)
# Verify passphrase file exists
if [ ! -f "$VAULT_PASS_FILE" ]; then
echo "Error: Passphrase file not found"
exit 1
fi
# Export vault to JSON
stegvault vault export vault.png \
-o "$BACKUP_DIR/vault_$DATE.json" \
--passphrase-file "$VAULT_PASS_FILE" \
--pretty
# Check exit code
if [ $? -eq 0 ]; then
echo "Backup created: $BACKUP_DIR/vault_$DATE.json"
# Get vault statistics
STATS=$(stegvault vault list vault.png \
--passphrase-file "$VAULT_PASS_FILE" \
--json)
ENTRY_COUNT=$(echo "$STATS" | jq -r '.data.entry_count')
echo "Backed up $ENTRY_COUNT entries"
else
echo "Backup failed"
exit 1
fi
Example: Password Rotation
#!/bin/bash
# rotate_password.sh - Programmatic password rotation
VAULT_FILE="vault.png"
SERVICE="github"
NEW_PASSWORD=$(openssl rand -base64 32)
# Retrieve current password info as JSON
INFO=$(stegvault vault get "$VAULT_FILE" \
-k "$SERVICE" \
--passphrase-file ~/.vault_pass \
--json)
if [ $? -eq 0 ]; then
USERNAME=$(echo "$INFO" | jq -r '.data.username')
# Update password via external API (example)
curl -X POST "https://api.github.com/user/password" \
-u "$USERNAME:$NEW_PASSWORD"
# Update vault with new password
stegvault vault update "$VAULT_FILE" \
-o "${VAULT_FILE}.new" \
-k "$SERVICE" \
--password "$NEW_PASSWORD" \
--passphrase-file ~/.vault_pass
mv "${VAULT_FILE}.new" "$VAULT_FILE"
echo "Password rotated successfully"
fi
How It Works
Architecture Overview
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ StegVault Workflow โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
BACKUP CREATION PASSWORD RECOVERY
โ โ
1. User Input 1. Load Stego Image
โข Master Password โข backup.png
โข Passphrase โข Enter Passphrase
โข Cover Image
2. Extract Payload
2. Encryption โข LSB Extraction
โข Generate Salt (16B) โข Sequential Order
โข Derive Key (Argon2id) โข Parse Binary Format
โข Encrypt (XChaCha20)
3. Decryption
3. Payload Format โข Verify AEAD Tag
โข Magic: "SPW1" โข Derive Key (Argon2id)
โข Salt + Nonce โข Decrypt Ciphertext
โข Ciphertext + Tag
4. Recover Password
4. LSB Embedding โข Display/Save Password
โข Sequential Pixels
โข Modify LSB of R,G,B
โข Save Stego Image
5. Output: backup.png
Cryptographic Stack
| Component | Algorithm | Parameters |
|---|---|---|
| AEAD Cipher | XChaCha20-Poly1305 | 256-bit key, 192-bit nonce |
| KDF | Argon2id | 3 iterations, 64MB memory, 4 threads |
| Salt | CSPRNG | 128 bits (16 bytes) |
| Nonce | CSPRNG | 192 bits (24 bytes) |
| Tag | Poly1305 | 128 bits (16 bytes) |
Payload Format
Binary structure embedded in images:
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ Offset โ Size โ Field โ Description โ
โโโโโโโโโโโโผโโโโโโโโโผโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโค
โ 0 โ 4B โ Magic Header โ "SPW1" โ
โ 4 โ 16B โ Salt โ For Argon2id โ
โ 20 โ 24B โ Nonce โ For XChaCha20โ
โ 44 โ 4B โ CT Length โ Big-endian โ
โ 48 โ N โ Ciphertext โ Variable โ
โ 48+N โ 16B โ AEAD Tag โ (appended) โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Steganography Techniques
StegVault automatically detects image format and uses the appropriate method:
PNG: LSB (Least Significant Bit) Embedding
- Sequential Pixel Ordering: All payload bits stored left-to-right, top-to-bottom for reliability and simplicity
- Distributed Embedding: Payload bits spread across R, G, B channels
- Minimal Visual Impact: Only LSB modified (imperceptible to human eye)
- High Capacity: ~3 bits per pixel (~90KB for 400x600 image)
# Simplified PNG LSB example
for y in range(height):
for x in range(width):
for channel in [R, G, B]:
channel_value = (channel_value & 0xFE) | payload_bit
JPEG: DCT Coefficient Modification
- Frequency Domain: Modifies DCT (Discrete Cosine Transform) coefficients in 8x8 blocks
- Anti-Shrinkage: Only uses coefficients with |value| > 1 to prevent artifacts
- Multi-Channel: Embeds across Y, Cb, Cr channels
- Robust: More resistant to JPEG recompression than spatial methods
- Lower Capacity: ~1 bit per suitable coefficient (~18KB for 400x600 Q85 image)
# Simplified JPEG DCT example
for block in [Y_blocks, Cb_blocks, Cr_blocks]:
for coef in block.AC_coefficients: # Skip DC
if abs(coef) > 1: # Anti-shrinkage
coef_lsb = abs(coef) % 2
if coef_lsb != payload_bit:
coef += 1 if coef > 0 else -1
Security Philosophy: Cryptographic strength (XChaCha20-Poly1305 + Argon2id) provides security, not the embedding method
Security Considerations
โ Strong Security Features
- Modern Cryptography: XChaCha20-Poly1305 is a modern AEAD cipher resistant to various attacks
- Strong KDF: Argon2id winner of Password Hashing Competition, resistant to GPU/ASIC attacks
- Authenticated Encryption: Poly1305 MAC ensures integrity; tampering detected automatically
- Cryptographic Security: Security provided by strong cryptography, not by hiding embedding pattern
- No Key Reuse: Fresh nonce generated for each encryption
โ ๏ธ Limitations & Warnings
- Not Invisible: Advanced steganalysis may detect embedded data
- No Deniability: Payload has identifiable magic header
- Format-Specific:
- PNG: Use lossless formats only; JPEG recompression destroys LSB data
- JPEG: More robust against recompression but lower capacity (~20% of PNG)
- Both Required: Losing either image OR passphrase = permanent data loss
- Offline Attacks: Attacker with image can attempt brute-force (mitigated by Argon2id)
๐ Best Practices
- Strong Passphrase: Use 16+ character passphrase with mixed case, numbers, symbols
- Multiple Backups: Store copies in different locations
- PNG Format: Always use PNG (lossless) not JPEG (lossy)
- Verify Backups: Test restore process after creating backup
- Secure Storage: Protect image files as you would protect passwords
Application Layer (v0.6.1)
StegVault now includes a clean Application Layer that separates business logic from UI concerns. This architecture enables multiple user interfaces (CLI, TUI, GUI) to share the same underlying operations.
Architecture
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โ User Interfaces (UI) โ
โ CLI (Click) โ TUI (Textual) โ GUI (Qt) โ
โโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโ
โ โ
โโโโโโผโโโโโโโโโโโโโโโโโโโผโโโโโ
โ Application Controllers โ
โ โข CryptoController โ
โ โข VaultController โ
โโโโโโฌโโโโโโโโโโโโโโโโโโโฌโโโโโ
โ โ
โโโโโโผโโโโโโโโโโโโโโโโโโโผโโโโโ
โ Core Modules โ
โ โข crypto โข vault โข stegoโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
Controllers
CryptoController
High-level encryption operations with structured results:
from stegvault.app.controllers import CryptoController
controller = CryptoController()
# Encrypt data
result = controller.encrypt(b"secret data", "passphrase")
if result.success:
print(f"Salt: {result.salt.hex()}")
print(f"Nonce: {result.nonce.hex()}")
else:
print(f"Error: {result.error}")
# Decrypt data
result = controller.decrypt(
ciphertext, salt, nonce, "passphrase"
)
if result.success:
print(f"Plaintext: {result.plaintext}")
VaultController
Complete vault CRUD operations:
from stegvault.app.controllers import VaultController
controller = VaultController()
# Create new vault
vault, success, error = controller.create_new_vault(
key="gmail",
password="secret123",
username="user@gmail.com",
url="https://gmail.com",
tags=["email", "personal"]
)
# Save to image
result = controller.save_vault(
vault, "vault.png", "passphrase",
cover_image="cover.png"
)
# Load from image
result = controller.load_vault("vault.png", "passphrase")
if result.success:
vault = result.vault
# Get entry
entry_result = controller.get_vault_entry(vault, "gmail")
if entry_result.success:
print(f"Password: {entry_result.entry.password}")
Benefits
- UI-Agnostic: Controllers work with any interface (CLI/TUI/GUI)
- Easy Testing: No need to mock UI frameworks
- Consistent Logic: Same business rules across all interfaces
- Thread-Safe: Designed for concurrent access (future GUI)
- Structured Results: All operations return typed result objects
Result Data Classes
All controller methods return structured results with success/error info:
EncryptionResult- Encryption operations (ciphertext, salt, nonce)DecryptionResult- Decryption operations (plaintext)VaultLoadResult- Vault loading (vault object, error)VaultSaveResult- Vault saving (output path, error)EntryResult- Entry retrieval (entry object, error)
Development
Running Tests
# Run all tests
pytest
# Run with coverage
pytest --cov=stegvault --cov-report=html
# Run specific module tests
pytest tests/unit/test_crypto.py -v
Code Quality
# Format code
black stegvault tests
# Type checking
mypy stegvault
Project Structure
stegvault/
โโโ stegvault/ # Source code
โ โโโ crypto/ # Cryptography (Argon2id + XChaCha20)
โ โ โโโ __init__.py
โ โ โโโ core.py
โ โโโ stego/ # Steganography (PNG LSB)
โ โ โโโ __init__.py
โ โ โโโ png_lsb.py
โ โโโ utils/ # Payload format handling
โ โ โโโ __init__.py
โ โ โโโ payload.py
โ โ โโโ config.py
โ โโโ vault/ # Password vault management (NEW in v0.4.0)
โ โ โโโ __init__.py
โ โ โโโ core.py # Vault and VaultEntry classes
โ โ โโโ operations.py # Vault CRUD operations + import
โ โ โโโ generator.py # Password generator
โ โ โโโ totp.py # TOTP/2FA support
โ โโโ batch/ # Batch operations
โ โ โโโ __init__.py
โ โ โโโ processor.py
โ โโโ gallery/ # Multi-vault management (v0.5.0)
โ โ โโโ __init__.py
โ โ โโโ core.py # Gallery and metadata classes
โ โ โโโ db.py # SQLite database operations
โ โ โโโ operations.py # Gallery CRUD operations
โ โ โโโ search.py # Cross-vault search
โ โโโ __init__.py
โ โโโ cli.py # Command-line interface
โโโ tests/ # Test suite (346 tests, 78% coverage)
โ โโโ unit/
โ โ โโโ test_crypto.py # 26 tests
โ โ โโโ test_payload.py # 22 tests
โ โ โโโ test_stego.py # 16 tests
โ โ โโโ test_config.py # 28 tests
โ โ โโโ test_batch.py # 20 tests
โ โ โโโ test_vault.py # 49 tests (vault module)
โ โ โโโ test_cli.py # 53 tests (core CLI)
โ โ โโโ test_vault_cli.py # 46 tests (vault CLI + TOTP)
โ โ โโโ test_totp.py # 19 tests (TOTP/2FA)
โ โ โโโ test_password_strength.py # 24 tests (password validation)
โ โ โโโ test_vault_search.py # 24 tests (search/filter backend)
โ โ โโโ test_vault_search_filter_cli.py # 5 tests (search/filter CLI)
โ โ โโโ test_vault_update_delete_cli.py # 12 tests (update/delete CLI)
โ โ โโโ test_gallery.py # 22 tests (gallery management)
โ โโโ __init__.py
โโโ docs/ # Documentation
โโโ examples/ # Example images
โโโ .gitignore
โโโ CHANGELOG.md
โโโ CONTRIBUTING.md
โโโ LICENSE # MIT License
โโโ README.md # This file
โโโ ROADMAP.md
โโโ pyproject.toml
โโโ requirements.txt
Roadmap
See ROADMAP.md for planned features and development timeline.
Coming Soon
- GUI application (Electron or Qt)
- JPEG DCT steganography (more robust)
- Multi-vault operations and search
- Gallery foundation for multi-file vault management
- Optional cloud storage integration
Contributing
Contributions are welcome! Please read CONTRIBUTING.md for guidelines.
Quick Contribution Guide
- Fork the repository
- Create feature branch (
git checkout -b feature/amazing-feature) - Make changes with tests
- Commit (
git commit -m 'feat: add amazing feature') - Push (
git push origin feature/amazing-feature) - Open Pull Request
License
This project is licensed under the MIT License - see LICENSE file for details.
Disclaimer
StegVault is provided "as-is" for educational and personal use. The authors are not responsible for any data loss or security breaches. Always maintain multiple backups of critical passwords.
Security Notice: While StegVault uses strong cryptography, no system is perfect. This tool is best used as a supplementary backup method alongside traditional password managers.
Acknowledgments
- PyNaCl - libsodium bindings for Python
- argon2-cffi - Argon2 password hashing
- Pillow - Python Imaging Library
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file stegvault-0.7.5.tar.gz.
File metadata
- Download URL: stegvault-0.7.5.tar.gz
- Upload date:
- Size: 97.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5dd6a467d6ce5e157ef18e3622a69b0894657420ca93c40025c262333c121509
|
|
| MD5 |
c865a17af22343be6572095320be6396
|
|
| BLAKE2b-256 |
7276b536458b520e50111b7c8c52bfef2a20bb6ca6511566c95bfec270fa303a
|
File details
Details for the file stegvault-0.7.5-py3-none-any.whl.
File metadata
- Download URL: stegvault-0.7.5-py3-none-any.whl
- Upload date:
- Size: 101.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
716a908340dd47ba51d552a57dc20db3ce6a3bce7ee3a5e6adcce6e991bf6aa8
|
|
| MD5 |
6ad3ad9a1ccf4ec16adc78e739d4e325
|
|
| BLAKE2b-256 |
d5154314a9ed50301bed42a30d9a6deb751a5d2f24a4eb78f2cb3258a74695e1
|