Thirteen mechanics inspired by quantum physics, engineered for real-world secret management.
One key holds values for dev, staging, and prod simultaneously. The correct value resolves based on your current context.
qring set API_KEY "sk-dev" --env dev
Auto-detects your environment from flags, env vars, git branches, and project config. Zero manual switching.
qring env
Secrets with TTL. Expired secrets are blocked, stale ones trigger warnings. Set explicit expiry or time-to-live.
qring set TOKEN "tok-..." --ttl 3600
Every read, write, and delete is logged. Access patterns are tracked for anomaly detection and audit trails.
qring audit --anomalies
Generate cryptographically strong secrets in API key, password, UUID, token, or hex formats.
qring generate --format api-key
Link secrets across projects. When you rotate one, all entangled copies update automatically.
qring entangle API_KEY API_KEY_BACKUP
Ephemeral secrets that exist only in memory. Never touch disk. Optional TTL and max-read self-destruction.
qring tunnel create "temp-tok" --max-reads 1
Pack secrets into AES-256-GCM encrypted bundles for secure transfer between machines.
qring teleport pack --keys "API_KEY"
Test if a secret is actually valid with its target service. Auto-detects OpenAI, Stripe, GitHub, and AWS from key prefixes.
qring validate --all
Register shell commands, HTTP webhooks, or process signals that fire when secrets are written, deleted, or rotated.
qring hook add --key DB_PASS --exec "..."
Declare required secrets in .q-ring.json and validate project readiness with a single command.
qring check
Migrate from .env files in one command. Supports standard dotenv syntax with comments, quotes, and escape sequences.
qring import .env --skip-existing
Generate .env files from the project manifest, resolving each key with environment-aware superposition collapse.
qring env:generate --output .env
Five commands. Your secrets are quantum-secured.
# Store a secret (prompts securely if value is omitted) $ qring set OPENAI_API_KEY sk-... # Retrieve it anytime $ qring get OPENAI_API_KEY # List all keys (values are never shown) $ qring list # Generate a cryptographic secret and save it $ qring generate --format api-key --prefix "sk-" --save MY_KEY # Run a full health scan $ qring health
31 tools for seamless AI agent integration. Works with Cursor, Kiro, and Claude Code.
{
"mcpServers": {
"q-ring": {
"command": "qring-mcp"
}
}
}
{
"mcpServers": {
"q-ring": {
"command": "qring-mcp"
}
}
}
A modular core engine bridging CLI and MCP to your OS-native keyring.
Autonomous background daemon that guards your secrets 24/7.
Scans secret health at configurable intervals. Detects expiration, anomalies, and staleness.
Automatically regenerates expired secrets using quantum noise. Zero downtime key rotation.
Tracks access patterns and flags burst access, unusual hours, and suspicious behavior.
$ qring agent --interval 60 --auto-rotate --verbose
Real-time visibility into every quantum subsystem. One command, zero config.
Data streams every 5 seconds via Server-Sent Events. No polling, no WebSocket complexity.
Health, environment, decay timers, superposition, entanglement, tunnels, anomalies, and audit log.
Self-contained HTML served on localhost. No dependencies, no cloud, no data leaves your machine.
# Launch the dashboard (auto-opens your browser) $ qring status # Custom port $ qring status --port 4200 # Don't auto-open the browser $ qring status --no-open