We've all done it — "hey can you DM me the staging .env?" Secrets end up in Slack history, email threads, shared notes — all searchable, all persistent. The secure path (1Password, GPG, etc.) always had more friction than the insecure one, so people took the shortcut.
enseal makes the secure path faster than the insecure one:
# sender
$ enseal share .env
Share code: 7-guitarist-revenge
Expires: 5 minutes or first receive
# recipient
$ enseal receive 7-guitarist-revenge
ok: 14 secrets written to .env
Zero setup, no accounts, no keys needed for basic use. Channels are single-use and time-limited. The relay never sees plaintext (age encryption + SPAKE2 key exchange).
For teams that want more: identity mode with public key encryption, process injection (secrets never touch disk), schema validation, at-rest encryption for git, and a self-hostable relay.
Written in Rust. MIT licensed. Available via cargo install, prebuilt binaries, or Docker.
Looking for feedback on the UX and security model especially. What would make you actually reach for this instead of the Slack DM?
Detailed documentation here: https://enseal.docsyard.com/