Private by default.
No DataMoat cloud account. Your vault, transcripts, skills, attachments, and keys stay on-device.
Protect and back up everything you build with Claude, Codex, Cursor, and OpenClaw against known quantum brute-force attacks.
Your prompts, plans, code, decisions, and workflows are becoming your future knowledge capital. DataMoat keeps a protected local copy before that work disappears from tool histories.
No DataMoat cloud account. Your vault stays local.
Windows ZIP + DataMoat.exe packages are full app folders. Unzip the package, keep the folder together, and run Install DataMoat.cmd once to launch DataMoat and register startup for the current Windows user.
DataMoat backs up supported skills + sessions + attachments into the same encrypted local vault. It preserves raw source records intact, saves skills as full folder snapshots, and builds a normalized index for search, export, reuse, handoff, and private AI memory.
No DataMoat cloud account. Your vault, transcripts, skills, attachments, and keys stay on-device.
Your most valuable future AI data is already disappearing from local app histories, cleanups, and compaction.
The people and companies that own their AI data will win the future.
DataMoat v2.0.1
Get the signed macOS app now, or choose Windows ZIP/source install options from DataMoat release downloads.
Get DataMoat for macOS View all install options
OpenClawYour AI work history is not just history. It is the work-process data your future agents and employees will need: the prompts, context, tool calls, outputs, corrections, decisions, files, logs, attachments, and skills behind finished work.
Those traces are private data assets: what the human asked, what context the agent saw, what tools were called, what files and skills were present, what was corrected, and what eventually worked.
Search past prompts, solutions, tool output, thinking-token context when present, timestamps, metadata, files, images, PDFs, attachments, and saved skills without depending only on a live service view.
Your AI work vault lives on your machine, encrypted at rest. DataMoat does not receive your transcripts, skills, attachments, vault database, search history, or vault keys.
AES-256-GCM vault storage with password-based unlock, optional TOTP, 24-word recovery phrase, one-time codes, local auditability, and Touch ID / Secure Enclave unlock on supported Macs.
AI work interaction data layer
Every AI-assisted task creates interactions between people, agents, files, tools, prompts, outputs, corrections, and decisions. DataMoat turns those interactions into an encrypted private data asset that future agents and employees can search, reuse, audit, and hand off.
That makes DataMoat more than a backup utility. It is the enterprise AI work black box and private knowledge base for the work your people and agents already did.
Keep the work record around incidents, migrations, bugs, product decisions, and repeated workflows so the next person can find the path, not just the outcome.
Preserve supported file context, attachments, skills, metadata, local source records, and the surrounding session that shaped the answer.
Save the prompt trail, corrections, constraints, clarifications, and decisions that turned a vague task into a usable result.
Capture supported tool calls, command output, errors, timestamps, source metadata, and stable attachments when the source writes them locally.
Keep the evidence around the adopted approach: alternatives discussed, failed paths, final commands, review notes, and the reason the team moved forward.
Make AI work searchable for reuse, audit, incident review, onboarding, project handoff, and private AI memory across Claude, Codex, Cursor, and OpenClaw.
DataMoat captures supported sessions, skills, attachments, and source records into the same encrypted local vault, preserving the interaction history companies need before it disappears into app-specific history, compaction, cleanup, or machine moves.
DataMoat provides a real local capture, encrypted vault, and review foundation for supported AI work records, skills, and attachments.
Captures supported local records from Claude CLI, Codex CLI, Codex app sessions, Claude Desktop local-agent sessions on macOS, OpenClaw, and Cursor.
Stores protected content as encrypted vault files instead of plaintext transcript dumps, with transcripts, skills, attachments, state, and source records encrypted at rest.
Normalizes supported records into session and message structures with prompts, responses, tool use, tool results, usage, model, timestamps, metadata, and parsed thinking blocks when available.
Stores supported image, document, and file attachments plus full SKILL.md folder snapshots, then lets you browse and search captured sessions locally after unlock.
Security architecture
DataMoat is designed around local ownership: supported source records, skills, and attachments are captured on your machine, written into AES-256-GCM encrypted vault storage, and searched only after a local unlock. DataMoat does not receive your transcripts, skills, attachments, vault database, search history, or vault keys.
Background capture can keep saving new supported records while the UI remains locked. Reading and searching existing vault content still require an approved unlock path: password, optional TOTP, Touch ID on supported Macs, recovery phrase, or one-time recovery code.
Vault JSONL lines, state files, raw records, and attachments are encrypted at rest with AES-256-GCM using 12-byte nonces and 16-byte authentication tags.
Normal unlock uses scrypt-derived material and stores verifiers or wrapped-key records instead of a plaintext password or plaintext vault key.
The 24-word phrase and one-time codes are local recovery paths. DataMoat stores hashed or wrapped recovery material, not the phrase or codes as readable text.
A background capture session can write new encrypted data and encrypted offset state while the UI stays locked; reading, searching, and display remain behind local unlock.
DataMoat saves encrypted raw source records before extractor logic decides what to show, so future extractors can rebuild richer views from the protected copy.
datamoat audit verify detects changed or broken entries in the current on-disk audit log. It is not a remote notarization service or deletion-proof ledger. Health/crash records redact secret-like values including tokens, mnemonics, recovery codes, passwords, and vault keys.
Future brute-force resistance
A DataMoat recovery phrase uses the BIP-39 24-word format, which encodes 256 bits of entropy plus checksum bits. That phrase is a human-backup path for releasing the vault key locally; DataMoat does not store the phrase as readable text.
The vault itself is sealed with AES-256-GCM. NIST treats AES-256 as the 256-bit symmetric-key security-strength baseline, and its post-quantum guidance says known quantum brute-force techniques such as Grover-style search do not currently turn high-strength symmetric encryption into a practical break. In plain English: today, the realistic risk is losing or exposing your recovery phrase, not someone GPU-guessing or quantum-cracking a properly generated 24-word phrase and AES-256 vault.
Raw-first vault
AI tools change their local formats quickly. DataMoat's raw-first path keeps an encrypted copy of the source record before transforming it into a searchable session, which reduces the risk of losing context when a parser gets better later.
A local vault should make each boundary visible: what gets read from supported source files, what is written encrypted, what requires human unlock, and what DataMoat never receives.
Supported AI tool records are read from local files. Raw source lines are content-stamped before extraction builds a searchable view.
source line -> sha256
Vault lines, raw records, offsets, session state, skills, and attachments are encrypted with AES-256-GCM before they become the protected copy.
nonce(12) + tag(16) + ciphertext
Password, optional TOTP, 24-word recovery phrase, one-time recovery code, or Touch ID on supported Macs opens read/search.
scrypt verifier + wrapped key
Existing vault content is decrypted only after local unlock. Browse and search happen through the local app, and DataMoat does not receive your vault, search history, or keys.
read session -> local UI
Full local transcript capture, including locally written thinking blocks when present.
Terminal sessions, transcript text, tool output, timestamps, metadata, and stable attachments.
Supported local app sessions, tool output, metadata, and stable image attachments.
Supported local-agent sessions on macOS when the desktop app writes them to disk.
Supported local OpenClaw transcripts plus provider, model, and cost metadata when present.
Readable local agent-transcripts JSONL records, including text and tool blocks when present.
Encrypted image and supported file/PDF blocks, linked back to their source sessions.
Global and project SKILL.md folder snapshots, including helper files, not just skill names.
$ datamoat
Open the DataMoat UI.
$ datamoat status
Check vault and system status.
Vault: Locked Items: 3,246 Vault: Encrypted Encryption: AES-256-GCM
$ datamoat scan
Scan for new data to capture.
Sources scanned: 3 New items: 54 Attachments: 6 Duration: 1.23s
$ datamoat audit verify
Verify the current audit log integrity. Without an external checkpoint, this does not prove the local log was never deleted, truncated, or fully rewritten.
Entries: 1,842 Status: Verified All good.
$ datamoat update check
Check for a newer DataMoat release.
Current: v2.0.1 Status: Up to date
Keep the work-process context your own future agents and employees can use: prompts, decisions, corrections, files, skills, attachments, and results.
Keep AI-assisted work reviewable across people, projects, machines, and clients without losing the process behind finished work.
Protect the private data asset that can later support private memory, evals, handoff, workflow analytics, or company-specific review under your rules.
Download DataMoat v2.0.1 and start backing up supported sessions, skills, and attachments before they disappear.
Download links verify the newest macOS and Windows assets from DataMoat release downloads.
The landing page may call the DataMoat release manifest to keep the download button current, but DataMoat does not receive your prompts, transcripts, tool output, files, skills, attachments, vault database, vault keys, or search history.
DataMoat captures and encrypts supported local work traces first. Any later use for private memory, evaluation, handoff, or workflow review depends on your permissions, policies, and choices.
For supported sources, DataMoat watches local transcript files and tracks byte offsets so new records can be captured quickly before compaction, retention cleanup, app format changes, device loss, or server moves make the original history harder to recover.
DataMoat preserves supported local transcript text, prompts, responses, tool output, timestamps, source metadata, stable image attachments, supported file/PDF blocks, full SKILL.md folder snapshots, and locally stored thinking tokens or reasoning blocks when the source application writes that content to disk.
DataMoat does not grant additional rights to source-service content. You remain responsible for the terms, policies, plan restrictions, internal rules, permissions, and laws that apply to Claude, Codex, OpenClaw, Cursor, and any other source service you use.
DataMoat preserves what is locally available. Claude CLI local session records can include full thinking text, while newer Codex CLI/app records often keep reasoning content unavailable or encrypted by the source app, so DataMoat preserves transcript, tool output, timestamps, metadata, and attachments instead.
A plaintext export is easy to leak, modify, lose, or misread later. DataMoat keeps the protected vault as the source of truth, encrypts raw records, state, offsets, and attachment blobs, and lets you verify the current hash-chained audit log with datamoat audit verify. The local audit chain is tamper-evident, not deletion-proof without an external checkpoint.
Vault records, skills, attachments, offsets, and session index state are encrypted at rest with AES-256-GCM. Passwords are stored as scrypt verifiers, not plaintext, and the UI still requires an approved unlock path before old records can be read or searched.
Source installs support password, optional TOTP, a 24-word BIP-39 recovery phrase, and one-time recovery codes. The packaged macOS app adds Touch ID and Secure Enclave-backed daily unlock on supported Macs.
Recovery is designed so you can regain access without storing your password in plaintext. Recovery material is shown locally during setup and should be kept offline by the human user.
An AI agent can download the macOS DMG or Windows ZIP, start DataMoat, and begin the remote no-screen capture flow. Password setup, TOTP enrollment, Touch ID, the 24-word phrase, and recovery codes should be completed by the human user on the machine being protected, not relayed through chat screenshots or remote messages.
The page starts with v2.0.1 in the HTML and then asks downloads.datamoat.org for the current latest release manifest. If the manifest is unavailable, the buttons keep using first-party download routes and GitHub remains only the archive fallback.
Personal use and internal company use are allowed by the grant. It is not an OSI-approved open source license, so production, resale, hosting, or other uses outside the grant should be checked against LICENSE.md.