Quickstart
A five-minute end-to-end walkthrough — install, unlock a local vault, use it from a standard libsecret tool. Assumes you've completed installation and rosec enable.
1. Create a local vault
rosec provider add local
# ... prompts for a master password (twice), creates the file at
# ~/.local/share/rosec/providers/local.vault
2. Unlock it
rosec unlock
# Master Password [Enter your master password]: ******
# local: unlocked
3. Add an item
rosec item add \
--provider local \
--label "Personal email" \
--attr username=alice \
--attr uri=mail.example.com \
--secret "hunter2"
4. Read it back
The whole point — your data is now reachable from any libsecret-aware program:
# Search by attribute, get the secret
secret-tool lookup uri mail.example.com
# hunter2
# Or via the rosec CLI
rosec search uri=mail.example.com
rosec inspect <id>
5. Pull SSH keys into your agent
If you stored an OpenSSH private key (in any provider — local, bitwarden, keepassxc-file), it's already in the rosec SSH agent:
SSH_AUTH_SOCK="$XDG_RUNTIME_DIR/rosec/ssh/agent.sock" ssh-add -l
Make rosec your default agent for the session by exporting SSH_AUTH_SOCK, or per the SSH agent integration guide.
6. Pull TOTP codes
Items with a totp secret automatically appear under a FUSE mount:
ls "$XDG_RUNTIME_DIR/rosec/totp/by-name/"
cat "$XDG_RUNTIME_DIR/rosec/totp/by-name/personal_email"
# 384295
The file content is the live TOTP code — re-read it whenever you need a fresh code.
What's next
- CLI reference — every
roseccommand. - Configuration —
config.tomlfor the daemon, autolock policies, prompt theming. - Providers — connect to Bitwarden, KeePassXC, or migrate from GNOME Keyring.
- PAM unlock — auto-unlock on login.