> vnsh: The Ephemeral Dropbox for AI

Stop pasting walls of text. Pipe it. Share it. Vaporize it.

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ†“โ†“ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
Drop files here to encrypt & share
โŒ˜V / Ctrl+V to paste
> Encrypting...
โœ“ Secure Link Ready
$ curl -sL vnsh.dev/i | sh
terminal
# Share k8s logs securely
$ kubectl logs pod/app-xyz | vn
https://vnsh.dev/v/a3f...#k=...
# Upload sensitive config files
$ vn .env.production
https://vnsh.dev/v/b7c...#k=...
# Share git diff with Claude
$ git diff HEAD~5 | vn
https://vnsh.dev/v/f9d...#k=...
$ cat myfile.txt | vn

Pipe anything to vn โ€” share the URL with Claude.

$ npx -y vnsh-mcp
// Claude Code: .mcp.json (project) or ~/.claude/settings.json
// Claude Desktop: ~/.config/claude/claude_desktop_config.json
"mcpServers": {
  "vnsh": {
    "command": "npx",
    "args": ["-y", "vnsh-mcp"]
  }
}

Claude can now read vnsh.dev URLs and decrypt content locally.
Restart Claude after adding config.

// Architecture & Security

Zero-Access Architecture: vnsh implements true client-side encryption using AES-256-CBC with OpenSSL compatibility. Your data is encrypted entirely on your device before upload.

Host-Blind Storage: The server stores only opaque binary blobs. Decryption keys travel exclusively in the URL fragment (#k=...) which is never sent to servers per HTTP specification.

Secure Dead Drop: Unlike pastebins, vnsh cannot read your content even if subpoenaed. The server operator has no access to plaintext - mathematically impossible without the URL fragment.

Auto-Vaporization: All data auto-destructs after 24 hours (configurable 1-168h). No history, no backups, no leaks. Perfect for ephemeral AI context sharing.

Blob: --- ๐Ÿ”ฅ --h
> Fetching blob...
> Extracting keys...
> Decrypting (AES-256-CBC)...
Keyboard Shortcuts
Copy CLI command/
Open file pickeru
Close overlayEsc
Toggle raw moder
Show shortcuts?