One binary. No Docker. No Postgres. No Redis. Runs anywhere Go runs.
The install script detects your OS and architecture, downloads the latest release, and puts it in your PATH.
Or download a binary directly:
The vault key encrypts your L1 data at rest. Set it as an environment variable. If you lose this key, L1 data cannot be recovered.
That's it. The vault server starts on port 1984. A SQLite database is created automatically.
Point your AI assistant at the vault. Works with Claude Code, Cursor, Codex, or any MCP-compatible client.
{
"mcpServers": {
"vault1984": {
"url": "http://localhost:1984/mcp",
"headers": {
"Authorization": "Bearer YOUR_MCP_TOKEN"
}
}
}
}
{
"mcpServers": {
"vault1984": {
"url": "http://localhost:1984/mcp",
"headers": {
"Authorization": "Bearer YOUR_MCP_TOKEN"
}
}
}
}
Generate an MCP token from the web UI at http://localhost:1984 after first run.
Export from your current password manager, then import. The LLM classifier automatically suggests L1/L2 assignments for each field.
Review the L1/L2 classification in the web UI before confirming. You can override any field's tier.
For always-on availability, run Vault1984 as a systemd service.
[Unit]
Description=Vault1984
After=network.target
[Service]
Type=simple
User=vault1984
EnvironmentFile=/etc/vault1984/env
ExecStart=/usr/local/bin/vault1984
Restart=always
RestartSec=5
[Install]
WantedBy=multi-user.target
Put Vault1984 behind a reverse proxy for TLS and remote access.
vault.yourdomain.com {
reverse_proxy localhost:1984
}
Caddy handles TLS automatically via Let's Encrypt. Nginx and Traefik work too.