Open-skills age-file-encryption
Encrypt and decrypt files or streams using age — a simple, modern, and secure encryption tool with small explicit keys, passphrase support, SSH key support, post-quantum hybrid keys, and UNIX-style composability. No config options, no footguns.
install
source · Clone the upstream repo
git clone https://github.com/besoeasy/open-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/besoeasy/open-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/age-file-encryption" ~/.claude/skills/besoeasy-open-skills-age-file-encryption && rm -rf "$T"
manifest:
skills/age-file-encryption/SKILL.mdsource content
age File Encryption
age is a minimal, modern encryption tool. It replaces GPG for most file encryption needs with a much simpler design: small explicit keys, no config files, and clean composability with UNIX pipes.
When to Use This Skill
- Encrypting files or directories before storing or sharing them
- Securely sending files to specific recipients by public key
- Encrypting secrets with a passphrase for backup or storage
- Encrypting to existing SSH public keys (ed25519 or RSA)
- Encrypting to multiple recipients at once
- Encrypting to a GitHub user's SSH keys
- Automating encryption/decryption in scripts
Installation
# macOS / Linux (Homebrew) brew install age # Debian / Ubuntu 22.04+ apt install age # Arch Linux pacman -S age # Alpine Linux apk add age # Fedora dnf install age # Windows winget install --id FiloSottile.age # From source (requires Go) go install filippo.io/age/cmd/...@latest
Pre-built binaries:
https://dl.filippo.io/age/latest?for=linux/amd64 https://dl.filippo.io/age/latest?for=darwin/arm64 https://dl.filippo.io/age/latest?for=windows/amd64
Core Concepts
| Term | Meaning |
|---|---|
| recipient | Public key — who can decrypt the file |
| identity | Private key file — used to decrypt |
| age public key | Starts with |
| age private key | Starts with , stored in a key file |
Key Generation
# Generate a key pair and save to key.txt age-keygen -o key.txt # Output: Public key: age1ql3z7hjy54pw3hyww5ayyfg7zqgvc7w3j2elw8zmrj2kg5sfn9aqmcac8p # Print only the public key from an existing key file age-keygen -y key.txt
Encrypting Files
With a recipient's public key
# Encrypt a file age -r age1ql3z7hjy54pw3hyww5ayyfg7zqgvc7w3j2elw8zmrj2kg5sfn9aqmcac8p -o secret.txt.age secret.txt # Using a pipe cat secret.txt | age -r age1ql3z7hjy54... > secret.txt.age
With a passphrase
# age will prompt for a passphrase (or autogenerate a secure one) age -p secret.txt > secret.txt.age
To multiple recipients
# Each recipient can independently decrypt the file age -o file.age \ -r age1ql3z7hjy54pw3hyww5ayyfg7zqgvc7w3j2elw8zmrj2kg5sfn9aqmcac8p \ -r age1lggyhqrw2nlhcxprm67z43rta597azn8gknawjehu9d9dl0jq3yqqvfafg \ file.txt
With a recipients file
# recipients.txt — one public key per line, # for comments cat recipients.txt # Alice age1ql3z7hjy54pw3hyww5ayyfg7zqgvc7w3j2elw8zmrj2kg5sfn9aqmcac8p # Bob age1lggyhqrw2nlhcxprm67z43rta597azn8gknawjehu9d9dl0jq3yqqvfafg age -R recipients.txt file.txt > file.txt.age
With SSH keys
# Encrypt using an SSH public key age -R ~/.ssh/id_ed25519.pub secret.txt > secret.txt.age # Encrypt to all SSH keys on a GitHub profile curl https://github.com/username.keys | age -R - secret.txt > secret.txt.age
With armor (PEM text output)
# Produces ASCII-safe output, safe to paste in email or config age -a -r age1ql3z7... secret.txt > secret.txt.age
Encrypting a directory (tar + age)
tar czf - ~/data | age -r age1ql3z7... > data.tar.gz.age
Decrypting Files
With an identity (key) file
age -d -i key.txt secret.txt.age > secret.txt
With passphrase
# age auto-detects passphrase-encrypted files age -d secret.txt.age > secret.txt # Prompts: Enter passphrase:
With an SSH private key
age -d -i ~/.ssh/id_ed25519 secret.txt.age > secret.txt
Decrypting to stdout (piping)
age -d -i key.txt archive.tar.gz.age | tar xzf -
Post-Quantum Keys (v1.3.0+)
Hybrid post-quantum keys protect against future quantum computer attacks.
# Generate a post-quantum key pair age-keygen -pq -o key.txt # Extract the public key (recipients start with age1pq1...) age-keygen -y key.txt > recipient.txt # Encrypt age -R recipient.txt file.txt > file.txt.age # Decrypt age -d -i key.txt file.txt.age > file.txt
Passphrase-Protected Identity Files
Store your private key encrypted with a passphrase:
# Generate key and immediately encrypt it with a passphrase age-keygen | age -p > key.age # Output: Public key: age1yhm4gctwfmrpz87tdslm550wrx6m79y9f2hdzt0lndjnehwj0ukqrjpyx5 # Encrypt a file using the public key age -r age1yhm4gctwfmrpz87tdslm550wrx6m79y9f2hdzt0lndjnehwj0ukqrjpyx5 secrets.txt > secrets.txt.age # Decrypt — age will prompt for the passphrase to unlock key.age first age -d -i key.age secrets.txt.age > secrets.txt
Inspect an Encrypted File
age-inspect secrets.age # JSON output for scripting age-inspect --json secrets.age
CLI Reference
Usage: age [--encrypt] (-r RECIPIENT | -R PATH)... [--armor] [-o OUTPUT] [INPUT] age [--encrypt] --passphrase [--armor] [-o OUTPUT] [INPUT] age --decrypt [-i PATH]... [-o OUTPUT] [INPUT] Options: -e, --encrypt Encrypt (default if omitted) -d, --decrypt Decrypt -o, --output OUTPUT Write result to file -a, --armor Output PEM-encoded text -p, --passphrase Encrypt with a passphrase -r, --recipient RECIPIENT Encrypt to recipient (repeatable) -R, --recipients-file PATH Encrypt to recipients from file (repeatable) -i, --identity PATH Identity file for decryption (repeatable)
INPUT defaults to stdin, OUTPUT defaults to stdout.
Tips
- Use
/-a
when the output needs to be text-safe (email, config files)--armor - Multiple
flags can be passed; unused identity files are silently ignored-i - Pass
as a path to read recipients or identities from stdin- - Encrypted files have the
extension by convention.age - age is composable — pipe freely with
,tar
,gzip
, etc.ssh - For automation, store the public key in the repo and keep the private key secret
Security Notes
- SSH key encryption embeds a public key tag in the file, making it possible to fingerprint which key was used
- Passphrase-protected identity files are useful for keys stored remotely, but usually unnecessary for local keys
- Post-quantum keys have ~2000-character public keys — use a recipients file for convenience
Related Skills
— Upload the encryptedanonymous-file-upload
file anonymously after encrypting.age
— Send encrypted files over email using armored output (send-email-programmatically
)-a
— Publish encrypted payloads to Nostrnostr-logging-system