<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Aarav Maloo</title>
    <description>The latest articles on DEV Community by Aarav Maloo (@aaravmaloo).</description>
    <link>https://dev.to/aaravmaloo</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3390261%2F8fb3fd10-ed4e-475e-9c5f-36e4ab81a4b2.jpg</url>
      <title>DEV Community: Aarav Maloo</title>
      <link>https://dev.to/aaravmaloo</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aaravmaloo"/>
    <language>en</language>
    <item>
      <title>I built a zero-knowledge CLI password manager from scratch. AES-256-GCM, Argon2id, 22 secret types, MCP support.</title>
      <dc:creator>Aarav Maloo</dc:creator>
      <pubDate>Thu, 19 Mar 2026 13:44:39 +0000</pubDate>
      <link>https://dev.to/aaravmaloo/i-built-a-zero-knowledge-cli-password-manager-from-scratch-aes-256-gcm-argon2id-22-secret-types-1b9h</link>
      <guid>https://dev.to/aaravmaloo/i-built-a-zero-knowledge-cli-password-manager-from-scratch-aes-256-gcm-argon2id-22-secret-types-1b9h</guid>
      <description>&lt;p&gt;I know the password manager space is crowded. 1Password, Bitwarden, KeePass — all great. All built by teams, funded by someone, making decisions on a roadmap you don't control.&lt;br&gt;
I built APM alone. Every line of security-critical code is hand-written by me. No AI wrote the crypto. No shortcuts.&lt;br&gt;
Here's what's under the hood:&lt;br&gt;
AES-256-GCM — authenticated encryption, not just confidentiality.&lt;br&gt;
Argon2id — winner of the Password Hashing Competition. Memory-hard at 64MB default, up to 512MB. GPU clusters hate it.&lt;br&gt;
Random salt plus three-layer key derivation — 96 bytes of key material split into Encryption, Authentication, and Validation keys.&lt;br&gt;
Zero knowledge — your master password is never stored. Ever.&lt;br&gt;
It supports 22 secret types: passwords, TOTP, SSH keys, API keys, Kubernetes credentials, banking info, medical IDs, legal documents, and more. Shell-scoped sessions with inactivity timeouts. A YAML-based password policy engine. A JSON-driven plugin architecture with event hooks. A full Team Edition with RBAC and isolated encryption domains. And an MCP server so your AI coding agent can query the vault — but only after you manually unlock it. The agent never holds the keys.&lt;br&gt;
I used AI for naming and readability refactors only. Every security-critical path is human-written. I believe no AI should be trusted blindly with cryptographic implementation, so I didn't.&lt;br&gt;
Is it perfect? No. Is the architecture sound? I think so, and I'd love for people smarter than me to tear it apart.&lt;br&gt;
GitHub: &lt;a href="https://github.com/aaravmaloo/apm" rel="noopener noreferrer"&gt;https://github.com/aaravmaloo/apm&lt;/a&gt;&lt;br&gt;
Docs: &lt;a href="https://aaravmaloo.github.io/apm" rel="noopener noreferrer"&gt;https://aaravmaloo.github.io/apm&lt;/a&gt;&lt;br&gt;
Tell me what I got wrong.&lt;/p&gt;

</description>
      <category>security</category>
    </item>
  </channel>
</rss>
