Crumbls
Services About Us Projects Blog Documentation Contact Us Help Desk
Services About Us Contact Us Help Desk
← All Packages /

Sealcraft

v1
  • Introduction
  • Installation
  • Getting Started
    • Model Integration
    • Encrypted JSON
  • KEK Providers
    • AWS KMS
    • GCP Cloud KMS
    • Azure Key Vault
    • HashiCorp Vault Transit
    • Local Provider
  • Encryption Contexts
    • Per-Group Strategy
    • Per-Row Strategy
    • Delegated Context
  • Key Management
    • KEK Rotation
    • DEK Rotation
    • Provider Migration
    • Crypto-Shred
  • Configuration
  • Events
  • Advanced
    • Architecture
    • Ciphers
    • Threat Model
    • Performance
    • Moving columns from APP_KEY to Sealcraft
  • Testing
  • API Reference
    • KeyManager
    • Contracts
    • Exceptions
  • Troubleshooting
  • Architecture Decisions
    • ADR-0001: Active-DEK uniqueness in app layer
    • ADR-0002: Per-row requires explicit backfill
  • Architecture -- how KEK, DEK, and context flow through a request
  • Ciphers -- AES-256-GCM vs XChaCha20-Poly1305, when to switch
  • Threat model -- what Sealcraft protects against and what it does not
  • Performance -- cache hit paths, request-lifetime costs
  • Moving columns from APP_KEY to Sealcraft -- per-column adoption for apps already using the encrypted cast

Contributors

Thank you to everyone who has contributed to this package. Every pull request, bug report, and idea makes a difference.

chasecmiller chasecmiller
View on GitHub Sponsor this project
Crumbls, LLC · Lafayette, CO 80026 · 303-909-3437 · contact@crumbls.com

Copyright © 2026 Crumbls, LLC. All rights reserved.

  • Privacy Policy
  • Terms of Service
  • Helpdesk