Show HN: VaultSandbox โ€“ Test your real MailGun/SES/etc. integration

Hacker News (score: 27)
Found: January 06, 2026
ID: 2932

Description

Testing
Show HN: VaultSandbox โ€“ Test your real MailGun/SES/etc. integration I've spent the last few months working on something I wish I'd had years ago. I kept running into the same issue: CI green, production mail broken. TLS handshake failures, DKIM alignment mismatches, SPF soft-fails ... the stuff that only surfaces when real mail servers are involved. Most test tools (Mailpit, MailHog) are catch-alls. They confirm "an email was sent" but don't validate the protocol. They also aren't designed for network-exposed environments: no auth, unprotected Web UI, easy to enumerate messages.

VaultSandbox is my attempt at fixing that. It's a self-hosted SMTP gateway (AGPLv3) that validates SPF, DKIM, DMARC, and rDNS on every incoming message. You keep your production email provider (Postmark, SendGrid, SES) in tests and you just change the recipient domain. No mocking, no config changes. There are client SDKs (Node, Python, Go, Java, .NET), plus a Web UI and a CLI for manual testing.

Some technical details:

Deterministic Tests Instead of polling or sleep loops, the SDKs use Server-Sent Events (SSE) so test assertions trigger the moment the mail hits the gateway.

Minimal infrastructure footprint Built with NestJS and Angular, with no external database dependency to keep the container footprint small and easier to reason about.

Post-Quantum Encryption I use ML-KEM-768 for the encryption layer. Incoming mail is encrypted immediately using a client-generated public key and the plaintext is discarded. The server only ever stores encrypted message data and cannot decrypt it. I chose PQ because I wanted to build something I wouldn't have to revisit in five years. If it handles large PQ keys reliably, everything else is easy.

Quick start: https://vaultsandbox.dev/getting-started/quickstart/

Site: https://vaultsandbox.com

I'd love feedback, especially on whether AGPLv3 would be a blocker for something you'd self-host in dev.

More from Hacker

Show HN: pgwire-replication - pure rust client for Postgres CDC

Show HN: pgwire-replication - pure rust client for Postgres CDC

Zero-Code Instrumentation of an Envoy TCP Proxy Using eBPF

Zero-Code Instrumentation of an Envoy TCP Proxy Using eBPF

List, inspect and explore OCI container images, their layers and contents

List, inspect and explore OCI container images, their layers and contents

Show HN: Titan โ€“ JavaScript-first framework that compiles into a Rust server

Show HN: Titan โ€“ JavaScript-first framework that compiles into a Rust server Hi HN,<p>I built Titan, a backend framework where you write routes and logic in JavaScript, and the CLI compiles everything into a single Rust + Axum binary using the Boa JS engine. No Node.js is required in production.<p>The idea is to keep JS developer experience while getting Rust performance and a self-contained deployable server.<p>Current features:<p>JS route DSL<p>Action system mapped to Rust<p>esbuild bundling<p>Generated Rust server with Axum<p>Hot-reload dev server<p>Single-binary output<p>Repo: <a href="https:&#x2F;&#x2F;github.com&#x2F;ezet-galaxy&#x2F;-ezetgalaxy-titan" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ezet-galaxy&#x2F;-ezetgalaxy-titan</a><p>Would love feedback on the architecture, DX, and whether this hybrid JSโ†’Rust approach is useful.<p>Thanks for reading!

No other tools from this source yet.