Immutable Releases on GitHub – A Significant Milestone for a Secure Software Supply Chain
The security of the software supply chain is one of the central topics in modern software …

In modern software development, the unsecured handling of credentials—so-called “Hardcoded Secrets” (static secrets) in Git repositories—is one of the most critical security risks. With the tightening of regulatory requirements in 2026, particularly through NIS-2 and DORA, the protection of API keys, database passwords, and SSH certificates is no longer just a best practice but a mandatory compliance requirement. Mid-sized companies face the challenge of ensuring security without hindering the agility of their DevOps teams.
The solution lies in a centralized, sovereign secrets management strategy. While highly complex enterprise solutions often fail due to their own administrative burden, Vaultwarden (the resource-efficient implementation of the Bitwarden API) offers the perfect balance. It serves as a technical bridge, transferring sensitive data from the insecure filesystem into an encrypted, auditable environment that remains seamlessly operable for both developers and IT operations.
The classic mistake in CI/CD pipelines is storing secrets in environment variables or—worse—directly in the source code. Vaultwarden uses robust AES-256-bit encryption (end-to-end) to encapsulate this data. By integrating Vaultwarden into the development workflow, teams can utilize “Organization Collections.” This allows for granular separation of dev, staging, and production secrets. The business benefit is clear: The risk of a supply chain attack through leaked credentials is minimized, as secrets never leave the secured environment in plaintext.
A central aspect of digital sovereignty is full control over who accessed which resource and when. Vaultwarden enables precise RBAC configuration. DevOps engineers gain access to infrastructure keys, while developers only see the API tokens relevant to their application. Thanks to integrated event logs, access can be seamlessly traced. This is a core requirement for audits according to ISO 27001. Instead of sharing passwords via messenger or unencrypted email, Vaultwarden creates a “Single Source of Truth,” systematically eliminating human error sources.
The acceptance of security tools hinges on the Developer Experience (DX). Vaultwarden is fully compatible with the Bitwarden CLI. This means secrets can be directly integrated into local scripts or deployment processes without leaving the terminal. By using Bitwarden clients (browser extensions, desktop apps), the bridge to the Ops team is built, which often needs to make manual interventions in management interfaces. This interoperability reduces overhead and ensures that security requirements are perceived not as obstacles but as part of efficient tooling.
Compared to the original Bitwarden server implementation (MSSQL/C#), Vaultwarden is written in Rust. This results in a minimal footprint and extremely fast response times through optimized binary protocols. For companies, this means: Maximum performance at minimal infrastructure costs. Since ayedo provides Vaultwarden as a Managed App on a sovereign cloud infrastructure, vendor lock-in with US SaaS providers is completely eliminated. Data sovereignty remains 100% within one’s own access.
Effective secrets management is the foundation of any Cloud-Native strategy. Vaultwarden proves that professional security doesn’t have to be complex. It bridges the gap between the necessary agility of developers and the strict security requirements of IT operations. By implementing Vaultwarden as a Managed App, companies transform their security from reactive firefighting to a proactive, automated process. ayedo supports you in building this bridge—secure, sovereign, and scalable.
After publishing this post, we received an interesting note on the topic of ‘Secrets Management.’ In the Cloud-Native world, there is an important distinction we want to clarify here:
In IT security, we differentiate between two types of secrets:
Why Vaultwarden is still the right choice: For many mid-sized companies, the introduction of dynamic secrets often represents too much administrative overhead. Vaultwarden closes the most critical gap first: It eliminates unsecured password lists and hardcoded API keys in the source code (Static Secrets). It serves as a bridge for the team, while technical full automation (Dynamic Secrets) is often the next step in the maturity curve.
Why is Vaultwarden better suited for mid-sized companies than HashiCorp Vault? While HashiCorp Vault is designed for highly complex, dynamic secret injections, Vaultwarden offers a significantly lower entry barrier and complexity in management. For most companies, the combination of user-friendliness (GUI/extensions) and technical API compatibility in Vaultwarden is more economical and effective in everyday use.
Does Vaultwarden also support dynamic secrets (rotation)? No, Vaultwarden specializes in the secure management and provision of static secrets and credentials. Unlike complex solutions like HashiCorp Vault, Vaultwarden does not generate short-lived, self-rotating credentials for databases. For companies seeking a user-friendly “Single Source of Truth” for their team credentials, which can be used via CLI in CI/CD pipelines, Vaultwarden is the significantly more efficient and cost-effective solution.
How secure is the storage of secrets in Vaultwarden really? Vaultwarden uses a zero-knowledge architecture. This means all data is encrypted client-side before reaching the server. Even in the event of physical server access, the data is worthless without the master key, which is never transmitted. The use of Rust as a programming language also eliminates many classic memory error security vulnerabilities.
Can Vaultwarden be integrated into existing LDAP or OIDC systems? Yes, through appropriate proxy solutions or in combination with identity providers like Keycloak, user management can be centralized. This enables automated onboarding and offboarding of employees, significantly increasing compliance and security.
What happens if the Vaultwarden instance fails? By providing it as a Managed App within a Kubernetes cluster, Vaultwarden benefits from automated replication and self-healing mechanisms. Backups of the encrypted database are created regularly and automatically, ensuring high availability and disaster recovery.
Does Vaultwarden support sharing secrets between teams? Yes, through so-called “Organizations” and “Collections,” secrets can be securely shared within teams or across projects. It can be precisely defined whether users can only read, edit, or also manage secrets.
The security of the software supply chain is one of the central topics in modern software …
TL;DR For logistics companies, delivery services, and fleet managers, routing is the heart of the …
In a perfect world, your Infrastructure as Code (IaC) repository is the absolute “Source of …