A database manager you can trust with production credentials.
Three rules: credentials never leave your machine, nothing phones home, and every claim on this page can be verified from the source. What follows is how that's actually built.
What we won't do.
Credentials never leave your machine
No cloud sync. No "log in to QueryDen". The vault file is encrypted on disk, the encryption key never leaves your computer, and the file is useless if copied to another laptop.
No telemetry, no analytics, no auto-update pings
The app does not phone home. Not on launch, not when you connect, not when you crash. The OS network monitor will confirm: zero outbound calls except the database server you chose to connect to.
You can audit every line
The source is on GitHub under MIT. The encryption code is ~300 lines of Rust in `src-tauri/src/storage.rs`. The CI pipeline that builds the binaries is in the same repo. There is no closed-source layer.
Six layers, all visible in the source.
The encrypted file at ~/.local/share/com.queryden.app/vault.json is
protected by the layers below. Remove any one and it stops working — that's the test.
host=db.acme.dev port=5432 user=alice password=correct-horse-battery-staple database=analytics ssh=bastion.acme.dev:22
Illustrative bytes from a vault file. Field layout reflects the real format in storage.rs: magic header, Argon2id salt, GCM nonce, encrypted payload, authentication tag. Every byte after the header looks like noise — because it is.
Source: src-tauri/src/storage.rs
What we defend against — and what we don't.
- A rooted/compromised OS. If an attacker controls your kernel they control your memory; no userland app can recover from this.
- A keylogger that captures your master password at the keyboard.
- A network attacker between you and a database that lacks TLS. Use SSL/TLS or our SSH tunnel — that's what they're for.
- You sharing a connection string in Slack. We can't fix that.