Key features: - 3-layer architecture: decoy/hidden/panic - Cryptographically indistinguishable layers (like VeraCrypt hidden volumes) - Client-side XChaCha20-Poly1305 encryption - IPFS decentralized storage - RAM-only key storage (forensics-resistant) - 100% free, open source
Real use cases: journalists protecting sources, activists in authoritarian regimes, crypto holders preventing theft.
Tech stack: Next.js 15, Cloudflare Pages/D1, @noble/ciphers, IPFS (Pinata/Filebase)
Tests for command injection, path traversal, prompt injection. Semantic detection, 5-second scans, zero dependencies.
https://github.com/Teycir/Mcpwn
Feedback welcome.
Key features: - 3-layer architecture: decoy/hidden/panic - Cryptographically indistinguishable layers (like VeraCrypt hidden volumes) - Client-side XChaCha20-Poly1305 encryption - IPFS decentralized storage - RAM-only key storage (forensics-resistant) - 100% free, open source
Real use cases: journalists protecting sources, activists in authoritarian regimes, crypto holders preventing theft.
Tech stack: Next.js 15, Cloudflare Pages/D1, @noble/ciphers, IPFS (Pinata/Filebase)