Migration Guides
Step-by-step guides to switch from other secret management tools to xenvsync.
From dotenv-vault
dotenv-vault uses a cloud service to manage encrypted vaults. xenvsync does everything locally with no cloud dependency.
1. Export your secrets
If you have a .env.vault from dotenv-vault, you need to decrypt it first using your DOTENV_KEY:
2. Set up xenvsync
3. Clean up dotenv-vault
4. Verify
Key differences: xenvsync vaults are not compatible with dotenv-vault vaults. The
.env.vault file format is different. xenvsync uses AES-256-GCM with a local key, while dotenv-vault uses a cloud-managed key.From sops
sops encrypts individual values within YAML/JSON/ENV files. xenvsync encrypts the entire .env file as a single unit.
1. Export your secrets
2. Set up xenvsync
3. Clean up sops
4. Verify
Key differences: sops supports KMS, PGP, and age keys with per-value encryption. xenvsync uses a single AES-256-GCM key (or X25519 team keys) and encrypts the entire file. If you need per-value encryption or cloud KMS integration, sops may be a better fit.
From git-crypt
git-crypt transparently encrypts files in a Git repo. xenvsync uses explicit push/pull commands and encrypts only .env files.
1. Export your secrets
2. Remove git-crypt
3. Set up xenvsync
4. Commit the migration
Key differences: git-crypt encrypts transparently on git operations and works with any file type. xenvsync is focused specifically on
.env files and adds features like in-memory injection (run), multi-environment support, and vault diff/status.Team Migration
If your team uses xenvsync's V2 (team) mode, follow these additional steps after any migration:
Feature Comparison
| Feature | xenvsync | dotenv-vault | sops | git-crypt |
|---|---|---|---|---|
| No cloud required | Yes | No | Yes | Yes |
| In-memory injection | Yes | No | No | No |
| Multi-environment | Yes | Yes | Manual | No |
| Team sharing | X25519 | Cloud | KMS/PGP | GPG |
| Key rotation | Yes | Cloud | Manual | No |
| Diff / audit log | Yes | No | Partial | No |
| Single binary | Yes | No | Yes | No |
| Passphrase protection | Yes | No | No | No |