Blog

Updates, ideas, and what we're building.

The latest from NoxKey — features, security insights, and developer workflows.

🗑️ March 21, 2026

Why I Deleted Every .env File on My Machine

47 .env files, duplicated keys, expired tokens, forgotten repos. I replaced them all with the macOS Keychain. Here's what changed.

Read article
🔑 March 15, 2026

Introducing NoxKey — Secrets That Never Leave Your Mac

Why we built a credential manager that lives in the macOS Keychain, protected by Touch ID, with zero outbound connections.

Read article
🌳 March 7, 2026

How We Built Process-Tree Agent Detection

Walk up the process tree from the requesting process, identify Claude/Cursor/Codex by binary name, and switch to encrypted handoff mode. Here's the full implementation.

Read article
🤖 February 28, 2026

6 Ways AI Agents Leak Your Secrets

AI coding assistants read .env files, echo credentials in debug output, and store tokens in conversation logs. Here's how each leak happens.

Read article
🧹 February 14, 2026

The Developer's Guide to Credential Hygiene

Most credential leaks aren't sophisticated attacks. They're habits: copy-paste, shared .env files, and forgotten tokens. Here's how to fix the habits.

Read article
👆 February 7, 2026

How Touch ID Can Protect Your API Keys

Biometric authentication for every secret access — not a master password, not an unlock timeout, your actual fingerprint.

Read article
🔐 January 24, 2026

macOS Keychain for Developers: A Practical Guide

Your Mac already has an encrypted credential store with biometric auth. Here's how to use it for API keys, tokens, and secrets.

Read article
🚨 January 10, 2026

Stop Putting Secrets in .env Files

The dotenv pattern was designed for convenience, not security. In 2026, with AI agents reading your project files, it's time to move on.

Read article