{{define "index"}}
George Orwell — 1984
The only password manager for AI agents worth your trust.
We cannot read your passwords. Not will not. Cannot. Your Credential and Identity keys are derived from your hardware authenticator and baked into your tokens. Our servers hold ciphertext they have never had the means to decrypt.
In 2022, attackers stole the entire vault database of a leading password manager. The encryption worked exactly as designed. Accounts are still being drained today — four years later. The problem was never the encryption. It was who held the key.
Every major password manager encrypts your vault — then stores a way to decrypt it. The company's servers have always had what it takes to read your passwords. You just hoped they wouldn't.
"We will not read your passwords" is a promise. Promises can be broken, compelled, or hacked. clavitor cannot read your Credential or Identity fields — not will not. Cannot. The key was never here.
Your AI needs your GitHub token to deploy. It shouldn't also be able to see your passport. Every other manager is all-or-nothing. clavitor gives agents exactly what they need — nothing more.
How it works
Everything in your vault is encrypted. What differs is who holds the key.
Vault Encryption covers everything — the server uses it to store and serve your data. Credential and Identity fields go further: those keys are derived from your hardware authenticator, baked into your tokens, and never sent to our servers. We hold the vault. We never got those keys.
Server-readable. Encrypted at rest with the vault key. Needed for search, entry listing, and MCP tool responses.
Encrypted client-side. The key lives in your agent tokens. The server stores ciphertext it has never had the means to decrypt.
Encrypted client-side with a key derived from your WebAuthn PRF. Hardware tap required. Not in tokens. Agents receive [Identity Encryption — hardware key required].
Not another password manager with an AI checkbox. The architecture is the feature.
Each field carries its own encryption layer. Your AI reads the API key, not the CVV. Same entry, different keys, different access.
Credential and Identity keys derive from your biometric hardware — Touch ID, Face ID, YubiKey, Titan Key. No master password. No server-side key storage. Math, not policy.
Store TOTP secrets as Credential fields. Your AI generates time-based codes on demand via MCP — no more switching to your phone during a deployment.
Your browser and agents encrypt before anything leaves the client. The vault stores what it receives. It has never seen your Credential or Identity plaintext.
No Docker. No Postgres. No Redis. One Go binary, one SQLite file. Runs on a Raspberry Pi. Runs on a $4/month VPS. Port 1984.
Native parsers for Chrome, Firefox, Bitwarden, Proton Pass. Any other format via LLM. Auto-detects which fields should be Credential vs Identity. Collision resolution by modification date.
MCP-native from day one. Every AI agent that supports MCP can read credentials, fetch API keys, and generate 2FA codes — using only what it needs.
Each token is a combined credential: MCP auth and the Credential private key, wrapped together. The agent decrypts locally. The server sees a request and returns ciphertext. Nothing in between.
~/.claude/mcp.json
{
"mcpServers": {
"clavitor": {
"url": "http://localhost:1984/mcp",
"headers": {
"Authorization": "Bearer v1984_..."
}
}
}
}
MCP Tools
get_credential — fetch by querylist_credentials — list accessible entriesget_totp — live 2FA codesearch_vault — full-text searchcheck_expiring — upcoming expirationssave_credential — write (explicit permission only)Identity Encryption fields
Agents receive [Identity Encryption — hardware key required] for card numbers, passports, and government IDs. They know the field exists. They cannot read it. Ever.
Four ways in. Each designed for a different context. All pointing at the same encrypted store.
MCP
Claude Code, Codex, Cursor, or any MCP-compatible agent. Search credentials, fetch API keys, complete 2FA flows — without asking you.
Extension
Autofill passwords, generate 2FA codes inline. LLM field mapping fills by intent, not CSS selector — works on SPAs, obfuscated forms, multi-step flows.
CLI
Pipe credentials into scripts and CI pipelines. vault get github.token — done.
API
REST API with read/write tokens. Full audit log: every access tagged by actor — web, extension, MCP, or agent name.
Real complaints. Real users.
Verbatim quotes from real users — pulled from public forums, GitHub issues, and community threads. Not cherry-picked. Not paraphrased.
Leading password manager — Community Forum
"The web extensions are laughably bad at this point. This has been going on for months. They either won't fill, wont' unlock, or just plain won't do anything (even clicking extension icon). It's so bad"
Community forum, April 2024
Leading password manager — GitHub Issues
"Every single website loads slower. From Google, up to social media websites like Reddit, Instagram, X... Even scrolling and animation stutters sometimes. So for me the browser extension is unusable. It interferes with my browsing experience like malware."
GitHub Issues, 2024
Leading password manager — Hacker News
"The fact they're drip-feeding how bad this breach actually was is terrible enough... Personally I'm never touching them again."
Hacker News, January 2023
Leading password manager — Community Forum
"Since doing so, it asks me to enter my password every 10 minutes or so in the chrome extension"
Community forum, November 2022
Leading password manager — Community Forums
"the password not only auto-filled in the password field, but also auto-filled in reddit's search box!"
Community forum
Leading password manager — Community Forums
"Bitwarden REFUSES to autofill the actual password saved for a given site or app...and instead fills an old password. It simply substitutes the OLD password for the new one that is plainly saved in the vault."
Community forum
All quotes verbatim from public posts. View sources →
A password manager that only works on your home network isn't a password manager. Your laptop moves. Your phone moves. Your agents run on servers in three time zones.
Self-hosting means a server with a public IP, DNS, TLS certificates, uptime monitoring, and backups. That's not a weekend project — that's infrastructure.
We run clavitor across regions on every continent. $20 $12/yr. Your Credential and Identity keys never leave your browser — we cannot read your private fields. Not policy. Math.
One command. No dependencies.
Terminal
MCP config for Claude Code / Cursor / Codex
{
"mcpServers": {
"clavitor": {
"url": "http://localhost:1984/mcp",
"headers": { "Authorization": "Bearer v1984_your_token_here" }
}
}
}