Zero-knowledge design
Client-side encryption

Security Overview

Vaultove is designed so encrypted data can be stored and synced without exposing plaintext secrets to our servers.

Encryption

AES-256-GCM is used for data encryption. Keys are derived with Argon2id.

Access model

Decryption requires your master password or recovery flow. Vault data remains encrypted at rest.

Operational trust

Security roadmap is publicly tracked and tied to concrete controls and documentation.

Document metadata

Version: SEC-1.0

Effective: February 14, 2026

Updated: February 14, 2026

Trust roadmap

  • Published subprocessor list and DPA summary.
  • Launch Trust Center with audit evidence.
  • Formalize incident response and status workflows.
  • SOC 2 readiness controls and external assessment.

Responsible disclosure

Report vulnerabilities or security concerns directly to security@vaultove.com.

Include reproduction details, affected flow, and expected impact so the team can triage quickly.