Free The Architect's Vault
A comprehensive security and developer toolkit. Encode, hash, generate, decode, and scan — with full algorithmic transparency and zero network access.
View Technical Specifications (For Developers)
- Hashing:
SubtleCrypto.digest()for SHA-256/384/512, SHA-1. MD5 via pure JS fallback - Encoding: Native
btoa()/atob()for Base64,encodeURIComponentfor URL, custom HTML entity maps - UUID:
crypto.randomUUID()(v4) with CSPRNG fallback - JSON→TS: Recursive object traversal with union type inference and optional property detection
- Secret Scanner: Web Worker with regex patterns for 30+ API key formats, PII, AWS keys, JWTs
Encoder/Decoder & Hash Lab
Base64, URL, HTML entities, JWT decode, SHA-256/SHA-1/MD5 hashing with hex output.
UUID Generator
Generate v4 UUIDs with cryptographically secure randomness. Bulk generation and copy support.
Password Architect
Generate strong passwords with customizable length, character sets, and entropy display.
JSON → TypeScript
Convert JSON objects to TypeScript interfaces with proper type inference and optional fields.
Secret Scanner
Scan code for leaked API keys, passwords, PII, and sensitive data patterns using Web Workers.
SHA-256 Algorithm Trace
Enter text above using the Encoder Lab to see the SHA-256 computation pipeline visualized in real-time.
About The Architect's Vault
The Architect's Vault is a highly secure, client-side cryptographic dashboard crafted specifically for developers, systems administrators, and security specialists. Engineered to run entirely in your local browser runtime, the Vault guarantees that your most sensitive cryptographic operations never leave your machine. Within this comprehensive suite, you can instantly generate robust cryptographically secure Master Passwords, utilize the Encoder Lab for complex Base64/Hex/URL transformations, generate deterministic UUID v4/v5 hashes, strictly type JSON payloads to TypeScript interfaces, and run the Secret Scanner to identify exposed API keys in raw strings. No tracking, no latency, total zero-trust security.
How to Use This Tool
- Access the Dashboard: Navigate to the Vault index and explore the five specialized security modules.
- Choose the Crypto Operation: Select Password Generation, Encoding transformations, UUIDs, or JSON-to-TS manipulation.
- Input Target Execution: Type or paste your data payload directly into the protected browser node.
- Modify Entropy Parameters: Customize hash lengths, strict typing structures, or special character injection vectors.
- Extract to Clipboard: Hit execute to locally map the output. Secure outputs auto-clear on refresh.
Frequently Asked Questions
How is the random password generation achieved?
We strictly utilize the browser's native `crypto.getRandomValues()` API ensuring cryptographically secure pseudo-random number generation (CSPRNG), completely avoiding the predictable artifacts found in standard `Math.random()` methods.
Is it safe to paste actual API keys to encode them?
100% safe. Because the Architect's Vault is a fully static application with zero backend databases or analytics tracking, your API keys and JWT payloads exist solely in your local RAM and evaporate instantly.