Transcript Vault
Find leaked API keys in AI chat transcripts. Rotate. Save the rest in an encrypted vault. macOS, on-device.
Claude Code, OpenAI Codex CLI, Gemini CLI, and Google Antigravity all save every conversation as a plain-text file on your Mac. If you ever pasted an API key into a prompt, or a tool printed one into the output, that secret is still sitting on disk long after you moved on.
Transcript Vault finds those leaked keys so you can rotate them at the provider, then locks every transcript inside an encrypted vault so the secrets stop sitting on disk in the clear. Everything runs on your Mac. Nothing is ever sent to a server.
What it does
See
Scans your Claude / Codex / Gemini CLI / Antigravity transcripts and flags the ones containing API keys, tokens, or private keys.
Rotate
You go to the provider, rotate the key, and mark it done in the app. The app never touches the provider on your behalf.
Save securely
Once a transcript is dealt with, it gets locked into an age-encrypted vault. Deleting the leftover plain text is an optional second step.
Track
Every alert reflects what still needs rotating. Deleting a transcript does not rotate a key, so the app keeps reminding you until you do.
Start here
Install & first scan
Download the signed .dmg, run your first scan, and read your
first report.
How it works
A plain-English walkthrough of detection, rotation, and the encrypted-vault save flow.
Security & privacy
Local-only posture, encryption details, on-device AI, and the limits we are honest about.
FAQ
Free vs Pro, supported assistants, refunds, licence migration, and the common questions.
Support
Where to send bug reports, billing questions, privacy questions, and security disclosures.

