AES-encrypted vault replaces plaintext .env files. Secrets auto-injected on server start. Auto-redacted from every log line.
Every developer has a .env file story. The junior who committed it. The Slack message with the production database password. The API key that ended up in a screenshot during a demo. Plaintext secrets in plaintext files are an accident in slow motion.
Donk stores secrets in an AES-encrypted local vault. You add a key-value pair — OPENAI_API_KEY, STRIPE_SECRET_KEY, whatever — and it's encrypted at rest, never written to disk in plaintext. When a server starts, its assigned secrets are injected as environment variables into the process. Your code reads them the same way it reads any env var. Nothing changes in your application code.
The vault auto-redacts secrets from all log output. If your app accidentally logs a request that contains your API key, Donk replaces it with ***REDACTED*** in the debug console. You can't leak what you can't see.
.env files — migrate in one clickdonk secrets list, donk secrets setVideo: 25–35 seconds. Adding a secret, starting a server, seeing the redacted log output.