romejoe76 downloadsInline encryption for sensitive fields in notes using KeePass-compatible (.kdbx) storage.
Inline encryption for notes using KeePass-compatible (.kdbx) storage.
Reference secrets in your Markdown notes with tokens like {{vc:profileId/path/to/entry#fieldName}}. They render as interactive "chips" — masked by default, never exposing plaintext in your notes.
.kdbx) databases inside your vault{{vc:...}} tokens that render as masked chipsisDesktopOnly: false){{vc:profileId/Group/Entry#FieldName}}
profileId — the profile configured in plugin settingsGroup/Entry — path to the KeePass entryFieldName — field on that entry (e.g. Password, UserName, or a custom field).kdbx file (or let the plugin create one).{{vc:...}} tokens into your notes — they render as chips in Live Preview and Reading mode.Search for VaultCrypt in Settings → Community plugins → Browse.
main.js, manifest.json, and styles.css from the latest release.<YourVault>/.obsidian/plugins/vaultcrypt/.npm install # Install dependencies
npm run dev # Watch mode — auto-recompile on change
npm run build # Type check + production bundle
npm run lint # ESLint analysis
To test locally, copy main.js, manifest.json, and styles.css to your vault's plugin folder and reload Obsidian (Settings → Community plugins).
npm run version # Bump version in manifest.json / versions.json
npm run release # npm version minor + git push + push tags
GitHub Actions (.github/workflows/release.yml) packages and attaches the release artifacts automatically on tagged commits. The tag must match the version in manifest.json exactly (no leading v).
ProtectedValue (kdbxweb) — never stored as plaintextIf VaultCrypt saves you time, consider sponsoring on GitHub.