How-tos
Export a session's scrollback
Export saves an SSH session’s scrollback to a file. The bytes are re-redacted on save (PEM blocks, passwords, AWS keys, JWTs stripped), and you can optionally encrypt the file with a passphrase using age.
A shared transcript can’t accidentally leak credentials — even ones that escaped redaction at display time get a second pass on export.
Steps
- Right-click the tab in the strip.
- Pick Export scrollback…. The Export dialog opens.
- Pick an encryption mode:
- None — writes plaintext
.log. - Age passphrase — writes
.log.ageencrypted with the passphrase you supply.
- None — writes plaintext
- If you chose passphrase encryption, enter the passphrase (twice, to confirm).
- Click Export. A native save dialog opens with a default filename derived from the tab’s label and current timestamp.
- Pick a location and click Save.
The file is written to disk via Transit AI’s process, not through the browser — no clipboard hop.
Decrypting an age-encrypted export
age -d transcript.log.age > transcript.log
The age binary is on Homebrew (brew install age) and most
Linux distros’ package managers. The passphrase prompt matches
what you typed in the dialog.
Why re-redact on save?
The redaction filter runs continuously on incoming bytes, but a fresh pass at save time catches anything the streaming filter might have missed:
- Patterns added since the session opened (we sometimes ship pattern updates in patch releases).
- Multi-line patterns (PEM, SSH key blocks) that the streaming filter sees in chunks and the save filter sees in full.
The re-redaction is non-destructive in memory — the original bytes in the live terminal pane aren’t modified.
File format
Plain UTF-8. Line endings are preserved as they were in the device output. No metadata header — just the raw redacted scrollback.
For binary-safe export (preserving ANSI escapes, alt-screen state), the file is byte-for-byte what was in the terminal’s scrollback buffer, minus any redactions.