INITIALIZING KERNEL... LOADING MODULES: CRYPTO [OK] LOADING MODULES: UI_RENDER [OK] CHECKING INTEGRITY... VERIFIED. ESTABLISHING SECURE CONNECTION... SYSTEM READY.
// CONNECTION_ESTABLISHED :: PORT 443 // VIEWERS :: 00000

CHRONOLOCK

A CLI tool that protects sensitive developer secrets using AES-256 encryption, filesystem immutability, and time-based "human-in-the-loop" authentication.

SYSTEM_CAPABILITIES

Zero_Leakage

Secrets bypass stdout. Direct memory-to-clipboard (`xsel`) pipeline ensures no logs retain your keys.

Immutable_Core

Kernel-level file locking via `chattr +i`. Even root cannot delete the vault without specific unlocking procedures.

Time_Dilation

Passwords rotate every 60 seconds based on a mental algorithm. Replay attacks are mathematically impossible after T+1m.

Human_Handshake

Anti-scripting defense. Requires random hex-code verification to prove operator presence.

DOWNLOAD AND USE

Lazy enough to set this up?? We got you. Lemme take care of you bbgl.
The most secure method of using Chronolock is to download and run the script.
Just copy this section, navigate to your preferred directory in your terminal, paste and run.

# 1. Run this magical command and add your keys in the file which opens up.
$

Modify the keys.json file with your base-password and secrets.
You can use custom keys for your secrets inside the nested secret part of the keys.json

# 2. Setup and encrypt your keys
$
# 3. Run
$

You can run chronolock natively from any path in your terminal.

DAILY_OPERATIONS

Run the tool as a normal user. The process has three distinct security phases.

$
Pass: [Input Hidden] Secret: [Paste Handshake] >> ACCESS GRANTED. Select Secret (1-4):

Phase 1: Time-Password Algorithm

You must calculate the password mentally.
Format: [BasePassword][Day][MonthInitial][HHMM]

If your base-password is MySecret and since the current time is LOADING...:

MySecret
+
--
+
--
+
--
=
CALCULATING...

Phase 2: The Session Handshake

If the password is correct, the tool copies a random Hex Code (e.g., a1b2c3d4) to your clipboard.

If the Hex Code is a1b2c3d4 and today is LOADING...:

a1b2c3d4
+
--
+
--
+
a1b2c3d4
=
CALCULATING...

Phase 3: Selection

A menu listing your keys will appear. Type the number of the secret you want. It will be silently copied to your clipboard.

SECURITY_PHILOSOPHY

ChronoLock is built for a specific threat model: Local Malware and Shoulder Surfing.

1. Threat Model: "The Wrench"

Malware: A script running on your PC (e.g., a bad npm package) tries to grab AWS_SECRET from env vars. It fails because it cannot "guess" the time-algorithm or your base password.

Snooping: Someone looking at your screen sees you type a password. Ten minutes later, they try to type the same password. It fails.

2. The "Salt" Concept

The time component is not the secret; it is a Salt. Security relies entirely on the Secret Key (your Base Password). If someone knows your Base Password, the system is broken regardless of the time component.