MCP-native · For Claude Code, Cursor & AI agents

Hand AI the kingdom.
Keep the keys.

Your API keys stay in the macOS Keychain. AI agents ask for them through MCP and get the values loaded as env vars — no copy-paste, no .env files, no secrets in the context window.

Download on the Mac App Store
NoxKey
noboxdev / gitpulse
OAUTH_SECRET api_key sk-pr...
DB_PASSWORD password xK9m2...
shared
CF_API_TOKEN token v1.0-...
GITHUB_PAT ghp_R...
oauth esc
OAUTH_SECRET
noboxdev/gitpulse
Copy
OAUTH_CLIENT_ID api_key
Touch ID ready
// Claude Code asks for a secret
> noxkey_get("noboxdev/gitpulse/OAUTH_SECRET")
# Touch ID prompt appears source '/tmp/noxkey-mcp-xyz/secrets.sh' $OAUTH_SECRET loaded (value not shown)
// Agent stores a new secret
> noxkey_set("proj/NEW_KEY", clipboard: true)
Stored proj/NEW_KEY
// No raw values, no .env, no paste

Credentials deserve better than this.

Developers work with dozens of secrets across projects. The current workflow is broken.

"Here's my API key..."

Pasting secrets into AI chats, Slack messages, or terminal prompts. Once it's in the context, you can't take it back.

The .env shuffle

Scattered .env files across projects. Copy-pasting between them. Accidentally committing one to git. Forgetting which key goes where.

Expired and forgotten

An API key expires. You find out when production breaks. No warnings, no tracking, no organization. Just surprises.

Secure by design. Fast by habit.

Everything you need to manage credentials without friction, and without exposing them.

Touch ID protected

Every secret retrieval requires biometric authentication. No master passwords. No unlocked vaults sitting open on your desktop.

MCP server built in

Claude Code, Cursor, and any MCP-aware agent can call noxkey_get, noxkey_set, noxkey_show, and noxkey_scan. Values load as env vars — never into the conversation.

Quick Access

Press Cmd+Shift+K from any app. A floating panel appears near your cursor. Search, Touch ID, copied. Under 2 seconds.

Organized by project

Name credentials as org/project/KEY and they group automatically. Filter instantly. No more hunting through .env files.

Credential types

Store API keys, login pairs, recovery codes, and plain secrets. Each with a dedicated form and type badge.

Expiry tracking

Set expiry dates on credentials. Get automatic warnings before they expire. Never find out from a production outage again.

Session unlock

Unlock a project prefix once with Touch ID. Access all credentials in that group without repeated prompts during your work session.

Clipboard auto-clear

Copied secrets are automatically cleared from your clipboard after 30 seconds. No stale credentials in your paste buffer.

macOS Keychain native

No proprietary vault. No sync servers. Everything lives in the macOS Keychain, encrypted by Apple's Secure Enclave.

Zero outbound connections. Your secrets never leave your Mac.

One keychain. Three ways to use it.

Built for AI agents first, with first-class surfaces for humans too.

For AI agents — MCP

Claude Code and other MCP clients call noxkey_get. The value is handed over as an env var. It never enters the model's context, never hits stdout, never gets copy-pasted.

For humans — menu bar

Click the menu bar icon or hit Cmd+Shift+K for the Quick Access panel. Search, authenticate with Touch ID, and the value is on your clipboard — cleared 30 seconds later.

For terminal — CLI

Installs with the app. noxkey get, noxkey set, noxkey ls — for when you're already in the shell and reaching for the mouse feels wrong.

Built for AI agents, end-to-end.

NoxKey ships with a Model Context Protocol server. Claude Code, Cursor, and any MCP-aware agent can ask for a secret — and get it — without the value ever touching the conversation.

Five MCP tools

noxkey_get, noxkey_set, noxkey_show, noxkey_scan, noxkey_admin — enough for agents to read, write, and organize secrets without ever shelling out.

Encrypted handoff

The agent sources a short-lived temp file to load the value as an env var. The value is never returned in a tool result, never hits stdout, never lands in the model's context window.

Process-tree detection

The app walks the requesting process tree and knows when the caller is an agent (Claude, Cursor, Codex). Agent-mode locks down raw-value flags and enforces the handoff pattern.

Session unlock per prefix

One Touch ID unlocks a whole org/project prefix for the session. Long-running agent work doesn't need re-auth on every secret.

Claude Code · MCP
// Agent asks for a secret
> noxkey_get("noboxdev/gitpulse/OAUTH_SECRET")
# Touch ID prompt on the Mac
source '/tmp/noxkey-mcp-xyz/secrets.sh'
$OAUTH_SECRET loaded (value not shown)

// Agent stores a new secret
> noxkey_set("proj/NEW_KEY", clipboard: true)
Stored proj/NEW_KEY

// Agent lists what's available
> noxkey_show("noboxdev/gitpulse")
OAUTH_SECRET   api_key
DB_PASSWORD    password

Fits your existing workflow.

NoxKey integrates with the tools you already use, without requiring any changes.

Terminal & shell scripts

Use in shell substitution, build scripts, and CI pipelines. Values flow to commands without appearing in logs.

Claude Code & AI agents

Encrypted share command designed for AI. Agents get access to secrets without the raw value entering their context window.

Team workflows

Consistent naming conventions across your organization. Everyone uses the same paths, so scripts just work.

Frequently asked questions.

Is NoxKey free?

Yes. NoxKey is completely free. No accounts, no subscriptions, no telemetry.

Does NoxKey send my secrets anywhere?

No. The app has zero outbound network connections — enforced by macOS App Sandbox at the kernel level. Updates come from the Mac App Store, so NoxKey itself never phones home. Verify the isolation anytime with codesign -d --entitlements - /Applications/NoxKey.app.

What happens if I uninstall NoxKey?

Your secrets stay in the macOS Keychain. You can access them through Keychain Access or reinstall NoxKey anytime. Nothing is lost.

Does it work without Touch ID?

NoxKey requires macOS 14.0 or later with Touch ID. On Macs without Touch ID, the system falls back to your device passcode.

Can AI agents see my raw secrets?

No. Agents receive encrypted temp files that auto-delete in 60 seconds. The raw value never enters the AI context. Commands like --raw and load are hard-blocked for agent callers.

How is this different from 1Password or Bitwarden?

NoxKey is built for developers and AI workflows, not browser autofill. No sync servers, no master password, no subscription. Everything stays local in the macOS Keychain.

Latest from NoxKey

View all posts

Stop sharing secrets.
Start managing them.

NoxKey is live on the Mac App Store. Free, AGPL-3.0, zero outbound network.

Requires macOS 14.0 or later with Touch ID.