Downloads
Get Clavitor on every surface.
Browser extension, mobile apps, CLI, and HTTPS proxy — all connected to one encrypted vault. Same encryption, same scoped tokens, same fingerprint.
Browser extension
Beta · Coming soonAutofill that knows which field is which. The extension reads the form and asks the model what to fill — not blind selector matching that ends up pasting your password into Reddit’s search box.
Manifest V3, shadow DOM injection, zero content scripts on pages you didn’t ask for. Vault stays remote. WASM crypto in the service worker. Extension stays under 10 MB.
- Inline autofill with intent-based field mapping
- Passkey creation, storage, and authentication
- WebAuthn unlock — no master password, ever
- Save & update prompts on form submit
- Password generator with HIBP breach checks
- Multi-account, vault picker per save
- Keyboard-first — every action shortcut-bound
- Light + dark mode, swap-color simple
Read the full extension overview.
Mobile apps
Beta · Coming soonYour vault on your phone. Face ID and Touch ID for the everyday unlock. NFC tap with a YubiKey for identity fields — the credit card and passport that even we can’t read.
Both apps are first-class clients, not companions: full vault CRUD, password generator, TOTP codes, offline access, cross-device sync. Android isn’t a port — it’s native, designed to feel like Android, not transplanted iOS.
- iOS AutoFill API, Android Autofill Framework
- Face ID, Touch ID, fingerprint, NFC YubiKey
- Passkey create + use (iOS 17+, Android 14+)
- TOTP codes with countdown
- Offline vault access, cached & encrypted
- Travel scope — only the credentials you want visible
- Hardware-key indicator on every L3 entry
- Connected POP, latency, sync status visible
Read the full mobile overview.
CLI
StableOne static binary. No dependencies. For agents, scripts, and CI pipelines. Issue scoped tokens per agent — each one sees only what you grant.
All downloads ship with a signed SHA-256 fingerprint. CLI reference & agent patterns →
HTTPS Proxy
Coming soonInject credentials into outgoing HTTPS requests transparently. The secret never enters the agent’s memory, logs, or context window. For CI pipelines, legacy tools, and agents you can’t modify.
- Drop-in HTTPS proxy — no agent changes
- Header-based credential injection
- Per-route scope policies
- Auditable WASM crypto core
Read the proxy architecture & threat model →