Install scrt4

One command. macOS, Linux, and WSL. Hardware-bound by FIDO2.

Install with a single command — same on every OS

# Requires curl, bash, and a FIDO2 authenticator (YubiKey, Touch ID, Windows Hello, or phone passkey).
curl -fsSL https://install.llmsecrets.com/native | sh
# After install, enroll your authenticator and open a session:
scrt4 setup && scrt4 unlock
AGPL-3.0 · source-available · SHA256-verified · no license key · no telemetry

Quick start

1

Register your hardware authenticator (one-time).

scrt4 setup
2

Unlock a session (default 20 hours).

scrt4 unlock
3

Import your existing .env file.

scrt4 import path/to/.env
4

Run commands with placeholder injection — the AI never sees the values.

scrt4 run 'curl -H "Authorization: Bearer $env[API_KEY]" https://api.example.com'
๐Ÿงน

Uninstall

One-shot uninstaller. Removes the daemon, CLI, and session data. Your vault stays on disk until you delete it.

curl -fsSL https://install.llmsecrets.com/uninstall | sh

Why You Can Trust This Download

Open source security through transparent verification

๐Ÿ‘ฅ
Open Source
Code reviewed by
community & AI
โ†’
๐Ÿ”
Build Hash
Committed to repo
before release
โ†’
โœ“
Published Hash
Displayed below
for verification
โ†’
๐Ÿ”
You Verify
Match hash =
Trusted download
๐Ÿ” How to Verify Your Download
  1. Download the file
  2. Run the hash command for your OS (below)
  3. Compare output to the published hash
  4. If they match โ†’ file is authentic
๐Ÿค– Not a Security Expert?

Use AI to audit our code. Ask questions like "Does this app send data externally?" or "How are secrets encrypted?"

Ask DeepWiki About Our Code โ†’

Verify the installer script (before piping to sh)

The same scrt4-native.sh is served from two independent hosts. If the hashes match each other and the one below, the bytes are genuine — an attacker would have had to compromise both GitHub and our CDN.

# Published SHA256 for scrt4-native.sh
21402a9cf89078680a1530094d216cfa6563c7a03480754da1731ed0ab9cf5cc scrt4-native.sh
# Two-hosts, one-hash check (both URLs must return the same hash):
curl -fsSL https://install.llmsecrets.com/native.sha256
curl -fsSL https://raw.githubusercontent.com/llmsecrets/llm-secrets/main/scrt4/install/scrt4-native.sh.sha256
# Verify locally, then run:
curl -fsSL https://install.llmsecrets.com/native -o scrt4-native.sh && sha256sum scrt4-native.sh && sh scrt4-native.sh

Verify your install (SHA256)

The installer verifies these checksums automatically. You can also verify by hand — the current release tag is v0.2.14-community, and the live manifest lives at SHA256SUMS.

# v0.2.14-community
bd8973080414d3e9388feb1d492da968253475a41f985377127902195401e6fb scrt4
92b187282dda56e5a2afda9536cee11f3331e688aa8dd210b10b4ae80f076e01 scrt4-daemon-darwin-aarch64
e78c5b8c9d2493e6f86f4f518f6cc8080c5c45fd4a0582c4e85d1554d8607666 scrt4-daemon-linux-aarch64
5bd23e4b4ce53adea302202b55badd416d30ad9cfd535a4704e0ff729f25f16b scrt4-daemon-linux-x86_64
# Fetch + check the whole manifest (macOS, Linux, WSL):
curl -fsSL https://install.llmsecrets.com/releases/$(curl -fsSL https://install.llmsecrets.com/releases/latest.txt)/SHA256SUMS -o SHA256SUMS && sha256sum -c SHA256SUMS
# Already installed? Ask scrt4 to verify itself:
scrt4 verify-self

System requirements

macOS

macOS 12+ with Touch ID or an external FIDO2 key

Linux

Any modern distro + a FIDO2 key, phone passkey, or WebAuthn-capable browser

WSL2

Windows 10/11 with WSL2; Windows Hello works out of the box

Legacy desktop apps

The original Windows Hello + TOTP desktop apps are in maintenance mode. New installs should use scrt4 above. These builds remain available for existing users.

๐ŸŽ

macOS (legacy)

Native app with Touch ID and Keychain integration.

Download v3.1.0
๐Ÿ–ฅ๏ธ

Windows (legacy)

Full GUI with Windows Hello biometric auth and backup tools.

Download v3.1.1
๐Ÿง

WSL (legacy)

Rust daemon for WSL2 that bridges Windows Hello to Linux CLI tools.

Download v0.3.1